All the vulnerabilites related to Samba - samba
cve-2021-20277
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20210326-0007/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://www.debian.org/security/2021/dsa-4884 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/ | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=1941402 | x_refsource_MISC | |
https://www.samba.org/samba/security/CVE-2021-20277.html | x_refsource_MISC | |
https://security.gentoo.org/glsa/202105-22 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:37:24.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-20277.html" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba\u0027s libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-26T11:08:41", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2021-20277.html" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-22" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-20277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in Samba\u0027s libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20210326-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402" }, { "name": "https://www.samba.org/samba/security/CVE-2021-20277.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2021-20277.html" }, { "name": "GLSA-202105-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-22" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-20277", "datePublished": "2021-05-12T13:54:05", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:37:24.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37967
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:37:42.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Windows Kerberos Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-37967", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T13:57:00.933042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T13:58:06.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4974:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4974", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4974:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4974", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2031:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.20348.2031", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6351:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.6351", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6351:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.6351", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22317:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22317", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22317:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22317:*:*:*:*:*:x86:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22317", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22317:*:*:*:*:*:x86:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22317", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26769:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26769", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26769:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26769", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24523:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24523", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24523:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24523", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21620:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.21620", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21620:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.21620", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-08T08:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Windows Kerberos Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T14:01:43.757Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Windows Kerberos Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" }, { "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "Windows Kerberos Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2022-37967", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-08-08T00:00:00", "dateUpdated": "2024-10-15T13:58:06.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44142
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.kb.cert.org/vuls/id/119678" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-44142.html" }, { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/119678" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "Samba", "versions": [ { "lessThan": "4.13.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "4.14.12", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "4.15.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:35.393591", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2021-44142.html" }, { "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" }, { "tags": [ "third-party-advisory" ], "url": "https://kb.cert.org/vuls/id/119678" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-44142", "datePublished": "2022-02-21T14:30:12.659324Z", "dateReserved": "2021-11-22T00:00:00", "dateUpdated": "2024-09-16T16:27:52.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0719
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:52.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "ADV-2011-0522", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0522" }, { "name": "SSA:2011-059-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593629" }, { "name": "1025132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678328" }, { "name": "RHSA-2011:0306", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0306.html" }, { "name": "DSA-2175", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2175" }, { "name": "46597", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46597" }, { "name": "ADV-2011-0541", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0541" }, { "name": "ADV-2011-0517", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0517" }, { "name": "ADV-2011-0702", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0702" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.4.12.html" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "ADV-2011-0518", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0518" }, { "name": "FEDORA-2011-3118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html" }, { "name": "43517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43517" }, { "name": "43557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43557" }, { "name": "43556", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43556" }, { "name": "43512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43512" }, { "name": "USN-1075-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1075-1" }, { "name": "ADV-2011-0519", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0519" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/security/CVE-2011-0719.html" }, { "name": "ADV-2011-0520", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0520" }, { "name": "FEDORA-2011-3120", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html" }, { "name": "43503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43503" }, { "name": "samba-fdset-dos(65724)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65724" }, { "name": "RHSA-2011:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0305.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.5.7.html" }, { "name": "43482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43482" }, { "name": "43843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43843" }, { "name": "MDVSA-2011:038", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.3.15.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "ADV-2011-0522", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0522" }, { "name": "SSA:2011-059-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593629" }, { "name": "1025132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678328" }, { "name": "RHSA-2011:0306", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0306.html" }, { "name": "DSA-2175", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2175" }, { "name": "46597", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46597" }, { "name": "ADV-2011-0541", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0541" }, { "name": "ADV-2011-0517", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0517" }, { "name": "ADV-2011-0702", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0702" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.4.12.html" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "ADV-2011-0518", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0518" }, { "name": "FEDORA-2011-3118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html" }, { "name": "43517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43517" }, { "name": "43557", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43557" }, { "name": "43556", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43556" }, { "name": "43512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43512" }, { "name": "USN-1075-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1075-1" }, { "name": "ADV-2011-0519", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0519" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/security/CVE-2011-0719.html" }, { "name": "ADV-2011-0520", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0520" }, { "name": "FEDORA-2011-3120", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html" }, { "name": "43503", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43503" }, { "name": "samba-fdset-dos(65724)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65724" }, { "name": "RHSA-2011:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0305.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.5.7.html" }, { "name": "43482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43482" }, { "name": "43843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43843" }, { "name": "MDVSA-2011:038", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.3.15.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0719", "datePublished": "2011-03-01T22:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T22:05:52.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1863
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.samba.org/samba/security/CVE-2013-1863 | x_refsource_CONFIRM | |
http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-1863" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-19T17:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-1863" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/security/CVE-2013-1863", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-1863" }, { "name": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1863", "datePublished": "2013-03-19T17:00:00Z", "dateReserved": "2013-02-19T00:00:00Z", "dateUpdated": "2024-09-16T20:12:41.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3347
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:4325 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:4328 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-3347 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2222792 | issue-tracking, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2023-3347.html |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-3347", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-25T13:37:21.160351Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-924", "description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:17:36.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:4325", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:4325" }, { "name": "RHSA-2023:4328", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:4328" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3347" }, { "name": "RHBZ#2222792", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230731-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5477" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-3347.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-3.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-3.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-103.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-103.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-07-19T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Samba\u0027s SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured \"server signing = required\" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS" } ], "providerMetadata": { "dateUpdated": "2024-09-16T12:33:08.826Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:4325", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:4325" }, { "name": "RHSA-2023:4328", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:4328" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3347" }, { "name": "RHBZ#2222792", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792" }, { "url": "https://www.samba.org/samba/security/CVE-2023-3347.html" } ], "timeline": [ { "lang": "en", "time": "2023-07-13T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-07-19T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: smb2 packet signing is not enforced when \"server signing = required\" is set" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-3347", "datePublished": "2023-07-20T14:54:05.525Z", "dateReserved": "2023-06-21T04:43:49.434Z", "dateUpdated": "2024-09-16T12:33:08.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0178
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "67686", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67686" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2014-0178" }, { "name": "1030308", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030308" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "67686", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67686" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2014-0178" }, { "name": "1030308", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030308" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "67686", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67686" }, { "name": "MDVSA-2014:136", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "FEDORA-2014-9132", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "http://www.samba.org/samba/security/CVE-2014-0178", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2014-0178" }, { "name": "1030308", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030308" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "59407", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "http://advisories.mageia.org/MGASA-2014-0279.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59579" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0178", "datePublished": "2014-05-28T01:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42669
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6209 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:6744 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7371 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7408 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7464 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7467 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-42669 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241884 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15474 | ||
https://www.samba.org/samba/security/CVE-2023-42669.html |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-42669", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-30T14:56:59.417578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T16:07:58.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:40.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-42669" }, { "name": "RHBZ#2241884", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241884" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15474" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-42669.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/samba-team/samba", "defaultStatus": "unaffected", "packageName": "samba", "versions": [ { "lessThan": "4.17.12", "status": "affected", "version": "4.0.0", "versionType": "semver" }, { "lessThan": "4.18.8", "status": "affected", "version": "4.18.0", "versionType": "semver" }, { "status": "affected", "version": "4.19.0" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-4.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/a:redhat:rhel_eus:9.0::resilientstorage" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-111.el9_0", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-104.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-10-10T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Samba\u0027s \"rpcecho\" development server, a non-Windows RPC server used to test Samba\u0027s DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the \"rpcecho\" service operates with only one worker in the main RPC task, allowing calls to the \"rpcecho\" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a \"sleep()\" call in the \"dcesrv_echo_TestSleep()\" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the \"rpcecho\" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as \"rpcecho\" runs in the main RPC task." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:41:51.656Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-42669" }, { "name": "RHBZ#2241884", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241884" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15474" }, { "url": "https://www.samba.org/samba/security/CVE-2023-42669.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-10T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: \"rpcecho\" development server allows denial of service via sleep() call on ad dc", "workarounds": [ { "lang": "en", "value": "To mitigate this vulnerability, disable rpcecho service on the AD DC by setting:\n~~~\ndcerpc endpoint servers = -rpcecho\n~~~" } ], "x_redhatCweChain": "CWE-400: Uncontrolled Resource Consumption" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-42669", "datePublished": "2023-11-06T06:57:28.981Z", "dateReserved": "2023-09-13T04:22:28.796Z", "dateUpdated": "2024-11-06T14:41:51.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0244
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "RHSA-2014:0866", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2014-0244" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "68148", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68148" }, { "name": "61218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61218" }, { "name": "59834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59834" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "name": "59848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59848" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "59433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59433" }, { "name": "59919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815" }, { "name": "1030455", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030455" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "RHSA-2014:0866", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2014-0244" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "68148", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68148" }, { "name": "61218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61218" }, { "name": "59834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59834" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "name": "59848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59848" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "59433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59433" }, { "name": "59919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815" }, { "name": "1030455", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030455" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0244", "datePublished": "2014-06-23T14:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3592
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:02.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-3592.html" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3592" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects samba since 4.17.0, Fixed samba 4.17.2." } ] } ], "descriptions": [ { "lang": "en", "value": "A symlink following vulnerability was found in Samba, where a user can create a symbolic link that will make \u0027smbd\u0027 escape the configured share path. This flaw allows a remote user with access to the exported part of the file system under a share via SMB1 unix extensions or NFS to create symlinks to files outside the \u0027smbd\u0027 configured share path and gain access to another restricted server\u0027s filesystem." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "CWE-61 - UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:47.417963", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137776" }, { "url": "https://www.samba.org/samba/security/CVE-2022-3592.html" }, { "url": "https://access.redhat.com/security/cve/CVE-2022-3592" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-3592", "datePublished": "2023-01-12T00:00:00", "dateReserved": "2022-10-18T00:00:00", "dateUpdated": "2024-08-03T01:14:02.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37966
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:37:42.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-37966", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T13:50:56.816223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T13:51:22.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "cpes": [], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "datePublic": "2022-11-08T08:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T14:01:42.756Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966" }, { "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2022-37966", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-08-08T00:00:00", "dateUpdated": "2024-10-15T13:51:22.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0810
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:48:37.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of service in Samba NETBIOS name service daemon (nmbd)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T07:59:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of service in Samba NETBIOS name service daemon (nmbd)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0810", "datePublished": "2000-01-04T05:00:00", "dateReserved": "1999-11-25T00:00:00", "dateUpdated": "2024-08-01T16:48:37.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2447
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:32.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "oval:org.mitre.oval:def:10062", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "26083", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26083" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2447: Remote Command Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468565/100/0/threaded" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25257" }, { "name": "VU#268336", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/268336" }, { "name": "23972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23972" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "SUSE-SR:2007:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html" }, { "name": "APPLE-SA-2007-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "25567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25567" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2007-2447.html" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25259" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34700", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/34700" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070514 Samba SAMR Change Password Remote Command Injection Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "1018051", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "2700", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2700" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25246" }, { "name": "25159", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25159" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25255" }, { "name": "RHSA-2007:0354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "26235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the \"username map script\" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "oval:org.mitre.oval:def:10062", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "26083", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26083" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2447: Remote Command Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468565/100/0/threaded" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25257" }, { "name": "VU#268336", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/268336" }, { "name": "23972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23972" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "SUSE-SR:2007:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html" }, { "name": "APPLE-SA-2007-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "25567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25567" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2007-2447.html" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25259" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34700", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/34700" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070514 Samba SAMR Change Password Remote Command Injection Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "1018051", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "2700", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2700" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25246" }, { "name": "25159", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25159" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25255" }, { "name": "RHSA-2007:0354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "26235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-2447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the \"username map script\" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-200705-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "25289", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "oval:org.mitre.oval:def:10062", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062" }, { "name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "26083", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26083" }, { "name": "ADV-2007-3229", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2447: Remote Command Injection Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468565/100/0/threaded" }, { "name": "OpenPKG-SA-2007.012", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25257" }, { "name": "VU#268336", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/268336" }, { "name": "23972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23972" }, { "name": "SUSE-SA:2007:031", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "SUSE-SR:2007:014", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html" }, { "name": "APPLE-SA-2007-07-31", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "ADV-2007-2281", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "ADV-2007-2210", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "2007-0017", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "25567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25567" }, { "name": "25241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28292" }, { "name": "http://www.samba.org/samba/security/CVE-2007-2447.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2007-2447.html" }, { "name": "MDKSA-2007:104", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25256" }, { "name": "https://issues.rpath.com/browse/RPL-1366", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25259" }, { "name": "SSA:2007-134-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34700", "refsource": "OSVDB", "url": "http://www.osvdb.org/34700" }, { "name": "102964", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070514 Samba SAMR Change Password Remote Command Injection Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534" }, { "name": "26909", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "1018051", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018051" }, { "name": "http://docs.info.apple.com/article.html?artnum=306172", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "2700", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2700" }, { "name": "25232", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25246" }, { "name": "25159", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25159" }, { "name": "25255", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25255" }, { "name": "RHSA-2007:0354", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "26235", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-2447", "datePublished": "2007-05-14T21:00:00", "dateReserved": "2007-05-02T00:00:00", "dateUpdated": "2024-08-07T13:42:32.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3585
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.samba.org/show_bug.cgi?id=7179 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=742907 | x_refsource_MISC | |
https://www.openwall.com/lists/oss-security/2011/09/27/1 | x_refsource_MISC | |
https://www.openwall.com/lists/oss-security/2011/09/30/5 | x_refsource_MISC | |
https://git.samba.org/?p=cifs-utils.git%3Ba=commitdiff%3Bh=810f7e4e0f2dbcbee0294d9b371071cb08268200 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:48.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7179" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2011/09/27/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2011/09/30/5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.samba.org/?p=cifs-utils.git%3Ba=commitdiff%3Bh=810f7e4e0f2dbcbee0294d9b371071cb08268200" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "3.6" } ] } ], "datePublic": "2010-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists." } ], "problemTypes": [ { "descriptions": [ { "description": "General Race Condition", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-31T19:47:07", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7179" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2011/09/27/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2011/09/30/5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.samba.org/?p=cifs-utils.git%3Ba=commitdiff%3Bh=810f7e4e0f2dbcbee0294d9b371071cb08268200" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3585", "datePublished": "2019-12-31T19:47:07", "dateReserved": "2011-09-21T00:00:00", "dateUpdated": "2024-08-06T23:37:48.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1678
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:24.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/5" }, { "name": "[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/9" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/22/6" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/22/4" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/05/7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980" }, { "name": "MDVSA-2011:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "name": "[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/07/9" }, { "name": "[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/04/01/2" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/10" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/16" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/31/4" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/12" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/7" }, { "name": "[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/11" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/05/3" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/31/3" }, { "name": "[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/15/6" }, { "name": "samba-smbfs-security-bypass(66702)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66702" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/5" }, { "name": "[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/9" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/22/6" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/22/4" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/05/7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980" }, { "name": "MDVSA-2011:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "name": "[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/07/9" }, { "name": "[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/04/01/2" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/10" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/16" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/31/4" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/12" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/14/7" }, { "name": "[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/04/11" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/05/3" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/31/3" }, { "name": "[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/15/6" }, { "name": "samba-smbfs-security-bypass(66702)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66702" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/14/5" }, { "name": "[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/04/9" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/22/6" }, { "name": "[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/22/4" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/05/7" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=688980", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688980" }, { "name": "MDVSA-2011:148", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "name": "[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/07/9" }, { "name": "[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/04/01/2" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/04/10" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/14/16" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/31/4" }, { "name": "[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/04/12" }, { "name": "[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/14/7" }, { "name": "[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/04/11" }, { "name": "[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/05/3" }, { "name": "[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/31/3" }, { "name": "[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2011/03/15/6" }, { "name": "samba-smbfs-security-bypass(66702)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66702" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1678", "datePublished": "2011-04-10T01:29:00", "dateReserved": "2011-04-09T00:00:00", "dateUpdated": "2024-08-06T22:37:24.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11103
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.apple.com/HT208221 | x_refsource_CONFIRM | |
http://www.debian.org/security/2017/dsa-3912 | vendor-advisory, x_refsource_DEBIAN | |
https://support.apple.com/HT208144 | x_refsource_CONFIRM | |
https://www.orpheus-lyre.info/ | x_refsource_MISC | |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc | vendor-advisory, x_refsource_FREEBSD | |
http://www.securityfocus.com/bid/99551 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1039427 | vdb-entry, x_refsource_SECTRACK | |
https://www.samba.org/samba/security/CVE-2017-11103.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038876 | vdb-entry, x_refsource_SECTRACK | |
https://support.apple.com/HT208112 | x_refsource_CONFIRM | |
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0 | x_refsource_CONFIRM | |
http://www.h5l.org/advisories.html?show=2017-07-11 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:57:57.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208221" }, { "name": "DSA-3912", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3912" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208144" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.orpheus-lyre.info/" }, { "name": "FreeBSD-SA-17:05", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc" }, { "name": "99551", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99551" }, { "name": "1039427", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039427" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-11103.html" }, { "name": "1038876", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208112" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.h5l.org/advisories.html?show=2017-07-11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus\u0027 Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in \u0027enc_part\u0027 instead of the unencrypted version stored in \u0027ticket\u0027. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-20T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208221" }, { "name": "DSA-3912", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3912" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208144" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.orpheus-lyre.info/" }, { "name": "FreeBSD-SA-17:05", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc" }, { "name": "99551", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99551" }, { "name": "1039427", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039427" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-11103.html" }, { "name": "1038876", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208112" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.h5l.org/advisories.html?show=2017-07-11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus\u0027 Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in \u0027enc_part\u0027 instead of the unencrypted version stored in \u0027ticket\u0027. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "DSA-3912", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3912" }, { "name": "https://support.apple.com/HT208144", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208144" }, { "name": "https://www.orpheus-lyre.info/", "refsource": "MISC", "url": "https://www.orpheus-lyre.info/" }, { "name": "FreeBSD-SA-17:05", "refsource": "FREEBSD", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc" }, { "name": "99551", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99551" }, { "name": "1039427", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039427" }, { "name": "https://www.samba.org/samba/security/CVE-2017-11103.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-11103.html" }, { "name": "1038876", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038876" }, { "name": "https://support.apple.com/HT208112", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208112" }, { "name": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0", "refsource": "CONFIRM", "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0" }, { "name": "http://www.h5l.org/advisories.html?show=2017-07-11", "refsource": "CONFIRM", "url": "http://www.h5l.org/advisories.html?show=2017-07-11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11103", "datePublished": "2017-07-13T13:00:00", "dateReserved": "2017-07-07T00:00:00", "dateUpdated": "2024-08-05T17:57:57.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1057
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103382 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2018/dsa-4135 | vendor-advisory, x_refsource_DEBIAN | |
https://usn.ubuntu.com/3595-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securitytracker.com/id/1040494 | vdb-entry, x_refsource_SECTRACK | |
https://security.gentoo.org/glsa/201805-07 | vendor-advisory, x_refsource_GENTOO | |
https://security.netapp.com/advisory/ntap-20180313-0001/ | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2018-1057.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1553553 | x_refsource_CONFIRM | |
https://www.synology.com/support/security/Synology_SA_18_08 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:11.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103382", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103382" }, { "name": "DSA-4135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4135" }, { "name": "USN-3595-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3595-1/" }, { "name": "1040494", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040494" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180313-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-1057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_08" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "All versions of Samba from 4.0.0 onwards." } ] } ], "datePublic": "2018-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users\u0027 passwords, including administrative users and privileged service accounts (eg Domain Controllers)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-09T22:06:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "103382", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103382" }, { "name": "DSA-4135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4135" }, { "name": "USN-3595-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3595-1/" }, { "name": "1040494", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040494" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180313-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-1057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_08" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1057", "datePublished": "2018-03-13T16:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:44:11.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0196
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A564 | vdb-entry, signature, x_refsource_OVAL | |
http://www.debian.org/security/2003/dsa-280 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:044 | vendor-advisory, x_refsource_MANDRAKE | |
http://www.redhat.com/support/errata/RHSA-2003-137.html | vendor-advisory, x_refsource_REDHAT | |
http://marc.info/?l=bugtraq&m=104973186901597&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=bugtraq&m=104974612519064&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:36.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:564", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A564" }, { "name": "DSA-280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "MDKSA-2003:044", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 [OpenPKG-SA-2003.028] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104973186901597\u0026w=2" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:564", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A564" }, { "name": "DSA-280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "MDKSA-2003:044", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 [OpenPKG-SA-2003.028] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104973186901597\u0026w=2" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:564", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A564" }, { "name": "DSA-280", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "MDKSA-2003:044", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 [OpenPKG-SA-2003.028] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104973186901597\u0026w=2" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0196", "datePublished": "2003-04-15T04:00:00", "dateReserved": "2003-04-01T00:00:00", "dateUpdated": "2024-08-08T01:43:36.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10197
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:18.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-10197.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190903-0001/" }, { "name": "USN-4121-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4121-1/" }, { "name": "20190904 [SECURITY] [DSA 4513-1] samba security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/4" }, { "name": "DSA-4513", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4513" }, { "name": "openSUSE-SU-2019:2142", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" }, { "name": "FEDORA-2019-e3e521e5b3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/" }, { "name": "FEDORA-2019-eb1e982800", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/" }, { "name": "FEDORA-2019-41c7fa478a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K69511801" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3253", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3253" }, { "name": "RHSA-2019:4023", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4023" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "SAMBA", "versions": [ { "status": "affected", "version": "samba 4.9.x up to 4.9.13" }, { "status": "affected", "version": "samba 4.10.x up to 4.10.8" }, { "status": "affected", "version": "samba 4.11.x up to 4.11.0rc3" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2019-10197.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190903-0001/" }, { "name": "USN-4121-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4121-1/" }, { "name": "20190904 [SECURITY] [DSA 4513-1] samba security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/4" }, { "name": "DSA-4513", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4513" }, { "name": "openSUSE-SU-2019:2142", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" }, { "name": "FEDORA-2019-e3e521e5b3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/" }, { "name": "FEDORA-2019-eb1e982800", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/" }, { "name": "FEDORA-2019-41c7fa478a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K69511801" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3253", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3253" }, { "name": "RHSA-2019:4023", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4023" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-10197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "samba 4.9.x up to 4.9.13" }, { "version_value": "samba 4.10.x up to 4.10.8" }, { "version_value": "samba 4.11.x up to 4.11.0rc3" } ] } } ] }, "vendor_name": "SAMBA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197" }, { "name": "https://www.samba.org/samba/security/CVE-2019-10197.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2019-10197.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190903-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190903-0001/" }, { "name": "USN-4121-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4121-1/" }, { "name": "20190904 [SECURITY] [DSA 4513-1] samba security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/4" }, { "name": "DSA-4513", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4513" }, { "name": "openSUSE-SU-2019:2142", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html" }, { "name": "FEDORA-2019-e3e521e5b3", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/" }, { "name": "FEDORA-2019-eb1e982800", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/" }, { "name": "FEDORA-2019-41c7fa478a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/" }, { "name": "https://support.f5.com/csp/article/K69511801", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K69511801" }, { "name": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3253", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3253" }, { "name": "RHSA-2019:4023", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4023" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-10197", "datePublished": "2019-09-03T14:50:27", "dateReserved": "2019-03-27T00:00:00", "dateUpdated": "2024-08-04T22:17:18.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0406
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-04/0319.html | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/bugtraq/2001-04/0326.html | mailing-list, x_refsource_BUGTRAQ | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000395 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.caldera.com/support/security/advisories/CSSA-2001-015.0.txt | vendor-advisory, x_refsource_CALDERA | |
http://archives.neohapsis.com/archives/bugtraq/2001-04/0305.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/670568 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/2617 | vdb-entry, x_refsource_BID | |
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-040.php3 | vendor-advisory, x_refsource_MANDRAKE | |
http://www.debian.org/security/2001/dsa-048 | vendor-advisory, x_refsource_DEBIAN | |
http://archives.neohapsis.com/archives/freebsd/2001-04/0608.html | vendor-advisory, x_refsource_FREEBSD |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:21:38.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010418 TSLSA-#2001-0005 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0319.html" }, { "name": "20010418 PROGENY-SA-2001-05: Samba /tmp vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0326.html" }, { "name": "CLA-2001:395", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000395" }, { "name": "CSSA-2001-015.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-015.0.txt" }, { "name": "20010417 Samba 2.0.8 security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0305.html" }, { "name": "VU#670568", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/670568" }, { "name": "2617", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2617" }, { "name": "MDKSA-2001:040", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-040.php3" }, { "name": "DSA-048", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-048" }, { "name": "FreeBSD-SA-01:36", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0608.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-05-09T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010418 TSLSA-#2001-0005 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0319.html" }, { "name": "20010418 PROGENY-SA-2001-05: Samba /tmp vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0326.html" }, { "name": "CLA-2001:395", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000395" }, { "name": "CSSA-2001-015.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-015.0.txt" }, { "name": "20010417 Samba 2.0.8 security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0305.html" }, { "name": "VU#670568", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/670568" }, { "name": "2617", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2617" }, { "name": "MDKSA-2001:040", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-040.php3" }, { "name": "DSA-048", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-048" }, { "name": "FreeBSD-SA-01:36", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0608.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010418 TSLSA-#2001-0005 - samba", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0319.html" }, { "name": "20010418 PROGENY-SA-2001-05: Samba /tmp vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0326.html" }, { "name": "CLA-2001:395", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000395" }, { "name": "CSSA-2001-015.0", "refsource": "CALDERA", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-015.0.txt" }, { "name": "20010417 Samba 2.0.8 security fix", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0305.html" }, { "name": "VU#670568", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/670568" }, { "name": "2617", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2617" }, { "name": "MDKSA-2001:040", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-040.php3" }, { "name": "DSA-048", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-048" }, { "name": "FreeBSD-SA-01:36", "refsource": "FREEBSD", "url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0608.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0406", "datePublished": "2001-05-24T04:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:21:38.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "storage", "vendor": "redhat", "versions": [ { "status": "affected", "version": "3.0" } ] }, { "cpes": [ "cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "enterprise_linux", "vendor": "redhat", "versions": [ { "status": "affected", "version": "-" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-14318", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T14:56:23.506771Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T13:52:19.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-14318.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.11.15, samba 4.12.9, samba 4.13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T16:05:59.418913", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892631" }, { "url": "https://www.samba.org/samba/security/CVE-2020-14318.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14318", "datePublished": "2020-12-03T00:00:00", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-10-29T13:52:19.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4138
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2007-4138.html" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "25636", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25636" }, { "name": "20070911 [SECURITY] Winbind\u0027s rfc2307 \u0026 SFU nss_info plugin in Samba 3.0.25[a-c] assigns users a primary gid of 0 by default", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/479078/100/0/threaded" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "SSA:2007-255-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.419439" }, { "name": "3135", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3135" }, { "name": "ADV-2007-3120", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3120" }, { "name": "26764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26764" }, { "name": "26834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26834" }, { "name": "26795", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26795" }, { "name": "1018681", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018681" }, { "name": "FEDORA-2007-2145", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "samba-smb-privilege-escalation(36560)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36560" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1705" }, { "name": "oval:org.mitre.oval:def:10375", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375" }, { "name": "26776", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26776" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the \"winbind nss info\" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2007-4138.html" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "25636", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25636" }, { "name": "20070911 [SECURITY] Winbind\u0027s rfc2307 \u0026 SFU nss_info plugin in Samba 3.0.25[a-c] assigns users a primary gid of 0 by default", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/479078/100/0/threaded" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "SSA:2007-255-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.419439" }, { "name": "3135", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3135" }, { "name": "ADV-2007-3120", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3120" }, { "name": "26764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26764" }, { "name": "26834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26834" }, { "name": "26795", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26795" }, { "name": "1018681", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018681" }, { "name": "FEDORA-2007-2145", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "samba-smb-privilege-escalation(36560)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36560" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1705" }, { "name": "oval:org.mitre.oval:def:10375", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375" }, { "name": "26776", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26776" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4138", "datePublished": "2007-09-14T01:00:00", "dateReserved": "2007-08-02T00:00:00", "dateUpdated": "2024-08-07T14:46:39.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3437
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:samba:samba:4.15.11:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "samba", "vendor": "samba", "versions": [ { "status": "unaffected", "version": "4.15.11" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-3437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T18:53:20.072020Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T18:59:39.543Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "name": "[oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in samba 4.15.11, samba 4.16.6, samba 4.17.2." } ] } ], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 - Heap-based Buffer Overflow, CWE-787 - Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T16:06:05.042792", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "name": "[oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-3437", "datePublished": "2023-01-12T00:00:00", "dateReserved": "2022-10-10T00:00:00", "dateUpdated": "2024-10-28T18:59:39.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0239
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.samba.org/samba/security/CVE-2014-0239 | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-201502-15.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/67691 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/59579 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1030309 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.369Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2014-0239" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "67691", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67691" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59579" }, { "name": "1030309", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2014-0239" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "67691", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67691" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59579" }, { "name": "1030309", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030309" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0239", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/security/CVE-2014-0239", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2014-0239" }, { "name": "GLSA-201502-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "67691", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67691" }, { "name": "59579", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59579" }, { "name": "1030309", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030309" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0239", "datePublished": "2014-05-28T01:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1140
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.samba.org/show_bug.cgi?id=13374 | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2018-1140.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180814-0001/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105082 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140 | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
▼ | Vendor | Product |
---|---|---|
The Samba Team | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13374" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-1140.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105082" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Team", "versions": [ { "status": "affected", "version": "4.8.0 and newer" } ] } ], "datePublic": "2018-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:14", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13374" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-1140.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105082" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.8.0 and newer" } ] } } ] }, "vendor_name": "The Samba Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable" } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.samba.org/show_bug.cgi?id=13374", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=13374" }, { "name": "https://www.samba.org/samba/security/CVE-2018-1140.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-1140.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180814-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105082" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1140", "datePublished": "2018-08-22T14:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2687
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/13378 | vdb-entry, x_refsource_OSVDB | |
http://lists.samba.org/archive/distcc/2004q3/002562.html | mailing-list, x_refsource_MLIST | |
http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec | x_refsource_MISC | |
http://distcc.samba.org/security.html | x_refsource_CONFIRM | |
http://lists.samba.org/archive/distcc/2004q3/002550.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:36:25.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050310 XCode 1.5 and distcc 2.x Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html" }, { "name": "13378", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/13378" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://distcc.samba.org/security.html" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-09-23T23:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050310 XCode 1.5 and distcc 2.x Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html" }, { "name": "13378", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/13378" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://distcc.samba.org/security.html" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2687", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050310 XCode 1.5 and distcc 2.x Exploit", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html" }, { "name": "13378", "refsource": "OSVDB", "url": "http://www.osvdb.org/13378" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "refsource": "MLIST", "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html" }, { "name": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec", "refsource": "MISC", "url": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec" }, { "name": "http://distcc.samba.org/security.html", "refsource": "CONFIRM", "url": "http://distcc.samba.org/security.html" }, { "name": "[distcc] 20040826 Exploit in distcc ( got compromised ;( )", "refsource": "MLIST", "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2687", "datePublished": "2007-09-23T23:00:00Z", "dateReserved": "2007-09-23T00:00:00Z", "dateUpdated": "2024-09-16T18:40:06.152Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20254
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1949442 | x_refsource_MISC | |
https://www.samba.org/samba/security/CVE-2021-20254.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210430-0001/ | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202105-22 | vendor-advisory, x_refsource_GENTOO | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:37:23.017Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-20254.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210430-0001/" }, { "name": "FEDORA-2021-1d0807008b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/" }, { "name": "FEDORA-2021-7026246ea9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-22" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-29T12:06:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2021-20254.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.netapp.com/advisory/ntap-20210430-0001/" }, { "name": "FEDORA-2021-1d0807008b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/" }, { "name": "FEDORA-2021-7026246ea9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-22" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-20254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949442" }, { "name": "https://www.samba.org/samba/security/CVE-2021-20254.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2021-20254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210430-0001/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20210430-0001/" }, { "name": "FEDORA-2021-1d0807008b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/" }, { "name": "FEDORA-2021-7026246ea9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/" }, { "name": "GLSA-202105-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-22" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-20254", "datePublished": "2021-05-05T13:36:32", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:37:23.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4476
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.samba.org/samba/history/samba-4.1.1.html | x_refsource_CONFIRM | |
http://www.samba.org/samba/history/samba-4.0.11.html | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-201502-15.xml | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html | vendor-advisory, x_refsource_SUSE | |
http://www.samba.org/samba/security/CVE-2013-4476 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-4476" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-27T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-4476" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/history/samba-4.1.1.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "name": "http://www.samba.org/samba/history/samba-4.0.11.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "GLSA-201502-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "http://www.samba.org/samba/security/CVE-2013-4476", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-4476" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4476", "datePublished": "2013-11-13T15:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1635
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d | x_refsource_CONFIRM | |
http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29 | x_refsource_MISC | |
http://samba.org/samba/history/samba-3.4.8.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:141 | vendor-advisory, x_refsource_MANDRIVA | |
http://samba.org/samba/history/samba-3.5.2.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=594921 | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=7229 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/40097 | vdb-entry, x_refsource_BID | |
http://security-tracker.debian.org/tracker/CVE-2010-1635 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1933 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:43.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.4.8.html" }, { "name": "MDVSA-2010:141", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.5.2.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7229" }, { "name": "40097", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40097" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-1635" }, { "name": "ADV-2010-1933", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1933" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-07-30T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.4.8.html" }, { "name": "MDVSA-2010:141", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.5.2.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7229" }, { "name": "40097", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40097" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-1635" }, { "name": "ADV-2010-1933", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1933" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1635", "datePublished": "2010-06-17T16:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:43.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2411
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 | vendor-advisory, x_refsource_HP | |
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability on HP NonStop Servers with software H06.x through H06.23.00 and J06.x through J06.12.00, when Samba is used, allows remote authenticated users to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-02T20:00:00Z", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2011-2411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability on HP NonStop Servers with software H06.x through H06.23.00 and J06.x through J06.12.00, when Samba is used, allows remote authenticated users to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBNS02701", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100598", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2011-2411", "datePublished": "2011-10-02T20:00:00Z", "dateReserved": "2011-06-06T00:00:00Z", "dateUpdated": "2024-09-16T19:25:16.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14907
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:52.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14907.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "All versions 4.11.x before 4.11.5" }, { "status": "affected", "version": "All versions 4.10.x before 4.10.12" }, { "status": "affected", "version": "All versions 4.9.x before 4.9.18" } ] } ], "descriptions": [ { "lang": "en", "value": "All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with \"log level = 3\" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:16.214931", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907" }, { "url": "https://www.samba.org/samba/security/CVE-2019-14907.html" }, { "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14907", "datePublished": "2020-01-21T00:00:00", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:34:52.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0086
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:35.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A554" }, { "name": "20030317 GLSA: samba (200303-11)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "7107", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7107" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "RHSA-2003:095", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "SuSE-SA:2003:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "DSA-262", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "8303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A554" }, { "name": "20030317 GLSA: samba (200303-11)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "7107", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7107" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "RHSA-2003:095", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "SuSE-SA:2003:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "DSA-262", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "8303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8299" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:554", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A554" }, { "name": "20030317 GLSA: samba (200303-11)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "refsource": "APPLE", "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "7107", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7107" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "RHSA-2003:095", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "SuSE-SA:2003:016", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "DSA-262", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "8303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8299" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0086", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-02-10T00:00:00", "dateUpdated": "2024-08-08T01:43:35.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-23192
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:05:55.765Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-23192.html" }, { "tags": [ "x_transferred" ], "url": "https://ubuntu.com/security/CVE-2021-23192" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects samba v4.10.0 to 4.15.1, Fixed in samba v4.15.2, v4.14.10 and v4.13.14." } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 - Improper Input Validation.", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:37.021661", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019666" }, { "url": "https://www.samba.org/samba/security/CVE-2021-23192.html" }, { "url": "https://ubuntu.com/security/CVE-2021-23192" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-23192", "datePublished": "2022-03-02T00:00:00", "dateReserved": "2021-10-20T00:00:00", "dateUpdated": "2024-08-03T19:05:55.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4408
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:13.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "RHSA-2013:1805", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-4408" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch" }, { "name": "DSA-2812", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2812" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "RHSA-2013:1806", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "64191", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64191" }, { "name": "RHSA-2014:0009", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html" }, { "name": "MDVSA-2013:299", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "RHSA-2013:1805", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-4408" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch" }, { "name": "DSA-2812", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2812" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "RHSA-2013:1806", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "64191", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64191" }, { "name": "RHSA-2014:0009", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html" }, { "name": "MDVSA-2013:299", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4408", "datePublished": "2013-12-10T02:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:13.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5398
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:31:58.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27691" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2007-90/advisory/" }, { "name": "oval:org.mitre.oval:def:10230", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "USN-544-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/544-1/" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29341" }, { "name": "SSA:2007-320-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5811", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28136" }, { "name": "ADV-2007-3869", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3869" }, { "name": "27679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27679" }, { "name": "27682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27682" }, { "name": "27701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27701" }, { "name": "1018953", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018953" }, { "name": "RHSA-2007:1013", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "27720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27720" }, { "name": "27742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27742" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30484" }, { "name": "20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded" }, { "name": "DSA-1409", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1409" }, { "name": "27450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27450" }, { "name": "27731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27731" }, { "name": "[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "MDKSA-2007:224", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224" }, { "name": "27787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "28368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28368" }, { "name": "26455", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26455" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1894" }, { "name": "GLSA-200711-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml" }, { "name": "20071115 Secunia Research: Samba \"reply_netbios_packet()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483744/100/0/threaded" }, { "name": "FEDORA-2007-3402", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html" }, { "name": "27927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27927" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "3372", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3372" }, { "name": "237764", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2007-5398.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" }, { "name": "ADV-2008-0064", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0064" }, { "name": "samba-replynetbiospacket-bo(38502)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38502" }, { "name": "SUSE-SA:2007:065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html" }, { "name": "20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "27691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27691" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2007-90/advisory/" }, { "name": "oval:org.mitre.oval:def:10230", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "USN-544-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/544-1/" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29341" }, { "name": "SSA:2007-320-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5811", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28136" }, { "name": "ADV-2007-3869", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3869" }, { "name": "27679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27679" }, { "name": "27682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27682" }, { "name": "27701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27701" }, { "name": "1018953", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018953" }, { "name": "RHSA-2007:1013", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "27720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27720" }, { "name": "27742", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27742" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30484" }, { "name": "20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded" }, { "name": "DSA-1409", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1409" }, { "name": "27450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27450" }, { "name": "27731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27731" }, { "name": "[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "MDKSA-2007:224", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224" }, { "name": "27787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "28368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28368" }, { "name": "26455", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26455" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1894" }, { "name": "GLSA-200711-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml" }, { "name": "20071115 Secunia Research: Samba \"reply_netbios_packet()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483744/100/0/threaded" }, { "name": "FEDORA-2007-3402", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html" }, { "name": "27927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27927" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "3372", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3372" }, { "name": "237764", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2007-5398.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" }, { "name": "ADV-2008-0064", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0064" }, { "name": "samba-replynetbiospacket-bo(38502)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38502" }, { "name": "SUSE-SA:2007:065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html" }, { "name": "20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2007-5398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27691", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27691" }, { "name": "http://secunia.com/secunia_research/2007-90/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2007-90/advisory/" }, { "name": "oval:org.mitre.oval:def:10230", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230" }, { "name": "RHSA-2007:1016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "USN-544-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/544-1/" }, { "name": "ADV-2007-4238", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "TA07-352A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "30835", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29341" }, { "name": "SSA:2007-320-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739" }, { "name": "HPSBUX02316", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "oval:org.mitre.oval:def:5811", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811" }, { "name": "28136", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28136" }, { "name": "ADV-2007-3869", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3869" }, { "name": "27679", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27679" }, { "name": "27682", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27682" }, { "name": "27701", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27701" }, { "name": "1018953", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018953" }, { "name": "RHSA-2007:1013", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html" }, { "name": "ADV-2008-1908", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "27720", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27720" }, { "name": "27742", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27742" }, { "name": "SSRT071495", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "30484", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30484" }, { "name": "20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded" }, { "name": "DSA-1409", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1409" }, { "name": "27450", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27450" }, { "name": "27731", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27731" }, { "name": "[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html" }, { "name": "SSRT080075", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "APPLE-SA-2007-12-17", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "MDKSA-2007:224", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224" }, { "name": "27787", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27787" }, { "name": "http://docs.info.apple.com/article.html?artnum=307179", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "28368", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28368" }, { "name": "26455", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26455" }, { "name": "https://issues.rpath.com/browse/RPL-1894", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1894" }, { "name": "GLSA-200711-29", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml" }, { "name": "20071115 Secunia Research: Samba \"reply_netbios_packet()\" Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483744/100/0/threaded" }, { "name": "FEDORA-2007-3402", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html" }, { "name": "27927", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27927" }, { "name": "ADV-2008-1712", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "ADV-2008-0859", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "3372", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3372" }, { "name": "237764", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1" }, { "name": "http://us1.samba.org/samba/security/CVE-2007-5398.html", "refsource": "CONFIRM", "url": "http://us1.samba.org/samba/security/CVE-2007-5398.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html" }, { "name": "RHSA-2007:1017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" }, { "name": "ADV-2008-0064", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0064" }, { "name": "samba-replynetbiospacket-bo(38502)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38502" }, { "name": "SUSE-SA:2007:065", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html" }, { "name": "20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2007-5398", "datePublished": "2007-11-16T18:00:00", "dateReserved": "2007-10-12T00:00:00", "dateUpdated": "2024-08-07T15:31:58.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3493
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "RHSA-2014:0866", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "61218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61218" }, { "name": "59834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59834" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "name": "59848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59848" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "68150", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68150" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "59433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59433" }, { "name": "59919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2014-3493" }, { "name": "1030455", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030455" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1" }, { "name": "MDVSA-2014:136", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136" }, { "name": "RHSA-2014:0866", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "61218", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61218" }, { "name": "59834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59834" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html" }, { "name": "59848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59848" }, { "name": "20140711 [ MDVSA-2014:136 ] samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "68150", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68150" }, { "name": "59407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59407" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "59433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59433" }, { "name": "59919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0279.html" }, { "name": "59378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59378" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "59579", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59579" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2014-3493" }, { "name": "1030455", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030455" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3493", "datePublished": "2014-06-23T14:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0870
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=KB29565" }, { "name": "SUSE-SU-2012:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" }, { "name": "USN-1374-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1374-1" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "name": "48844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48844" }, { "name": "48116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48116" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48879" }, { "name": "48186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48186" }, { "name": "SUSE-SU-2012:0338", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "blackberry-playbook-samba-code-execution(73361)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=KB29565" }, { "name": "SUSE-SU-2012:0337", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" }, { "name": "USN-1374-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1374-1" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "name": "48844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48844" }, { "name": "48116", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48116" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48879" }, { "name": "48186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48186" }, { "name": "SUSE-SU-2012:0338", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "blackberry-playbook-samba-code-execution(73361)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0870", "datePublished": "2012-02-23T11:00:00", "dateReserved": "2012-01-19T00:00:00", "dateUpdated": "2024-08-06T18:38:14.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1886
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-1664", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1664" }, { "name": "DSA-1823", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2009-1886.html" }, { "name": "35573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35573" }, { "name": "35606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35606" }, { "name": "SSA:2009-177-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591" }, { "name": "35472", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35472" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "35539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35539" }, { "name": "1022441", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022441" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=6478" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36918" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch" }, { "name": "MDVSA-2009:196", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196" }, { "name": "samba-smbclient-format-string(51328)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51328" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2009-1664", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1664" }, { "name": "DSA-1823", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2009-1886.html" }, { "name": "35573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35573" }, { "name": "35606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35606" }, { "name": "SSA:2009-177-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591" }, { "name": "35472", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35472" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "35539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35539" }, { "name": "1022441", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022441" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=6478" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36918" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch" }, { "name": "MDVSA-2009:196", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196" }, { "name": "samba-smbclient-format-string(51328)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51328" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-1886", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-02T00:00:00", "dateUpdated": "2024-08-07T05:27:54.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14870
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870" }, { "name": "USN-4217-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4217-1/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14870.html" }, { "name": "USN-4217-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4217-2/" }, { "name": "FEDORA-2019-be98a08835", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "name": "openSUSE-SU-2019:2700", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "name": "FEDORA-2019-11dddb785b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "all versions 4.11.x before 4.11.3" }, { "status": "affected", "version": "all versions 4.10.x before 4.10.11" }, { "status": "affected", "version": "all versions 4.x.x before 4.9.17" } ] } ], "descriptions": [ { "lang": "en", "value": "All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-08T08:06:43.843846", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870" }, { "name": "USN-4217-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4217-1/" }, { "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "url": "https://www.samba.org/samba/security/CVE-2019-14870.html" }, { "name": "USN-4217-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4217-2/" }, { "name": "FEDORA-2019-be98a08835", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "name": "openSUSE-SU-2019:2700", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "name": "FEDORA-2019-11dddb785b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14870", "datePublished": "2019-12-10T00:00:00", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-17049
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:45:34.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049" }, { "name": "[oss-security] 20211110 Fwd: Samba 4.15.2, 4.14.10, 4.13.14 Security Releases are available for Download", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/11/10/3" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-17049", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:12:34.390288Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:12:52.309Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.2061", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.2061", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server, version 1909 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server, version 1903 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server version 2004", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19041.1110", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.4530", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.4530", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.21167", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.21167", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.21167", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.25661", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.25661", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.23409", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.23409", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.20069", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.20069", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server version 20H2", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.19041.1110", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "datePublic": "2020-11-10T08:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD).\nTo exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it.\nThe update addresses this vulnerability by changing how the KDC validates service tickets used with KCD." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Security Feature Bypass", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T15:51:56.659Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049" }, { "name": "[oss-security] 20211110 Fwd: Samba 4.15.2, 4.14.10, 4.13.14 Security Releases are available for Download", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/11/10/3" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "Kerberos KDC Security Feature Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-17049", "datePublished": "2020-11-11T00:00:00", "dateReserved": "2020-08-04T00:00:00", "dateUpdated": "2024-11-15T16:12:52.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0085
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:36.004Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030317 Security Bugfix for Samba - Samba 2.2.8 Released", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792723017768\u0026w=2" }, { "name": "20030317 GLSA: samba (200303-11)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "oval:org.mitre.oval:def:552", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A552" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "7106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7106" }, { "name": "RHSA-2003:095", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "VU#298233", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/298233" }, { "name": "SuSE-SA:2003:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "IMNX-2003-7+-003-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "DSA-262", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "20030401 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "8303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8299" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030317 Security Bugfix for Samba - Samba 2.2.8 Released", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792723017768\u0026w=2" }, { "name": "20030317 GLSA: samba (200303-11)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "oval:org.mitre.oval:def:552", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A552" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "7106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7106" }, { "name": "RHSA-2003:095", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "VU#298233", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/298233" }, { "name": "SuSE-SA:2003:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "IMNX-2003-7+-003-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "DSA-262", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "20030401 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "8303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8299" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030317 Security Bugfix for Samba - Samba 2.2.8 Released", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104792723017768\u0026w=2" }, { "name": "20030317 GLSA: samba (200303-11)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104792646416629\u0026w=2" }, { "name": "GLSA-200303-11", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml" }, { "name": "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "APPLE-SA-2003-03-24", "refsource": "APPLE", "url": "http://www.securityfocus.com/archive/1/316165/30/25370/threaded" }, { "name": "RHSA-2003:096", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "oval:org.mitre.oval:def:552", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A552" }, { "name": "20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104801012929374\u0026w=2" }, { "name": "7106", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7106" }, { "name": "RHSA-2003:095", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-095.html" }, { "name": "VU#298233", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/298233" }, { "name": "SuSE-SA:2003:016", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2003_016_samba.html" }, { "name": "MDKSA-2003:032", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:032" }, { "name": "IMNX-2003-7+-003-01", "refsource": "IMMUNIX", "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "DSA-262", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-262" }, { "name": "20030401 Immunix Secured OS 7+ samba update", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/317145/30/25220/threaded" }, { "name": "8303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8303" }, { "name": "20030302-01-I", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I" }, { "name": "8299", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8299" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0085", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-02-10T00:00:00", "dateUpdated": "2024-08-08T01:43:36.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0453
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24101" }, { "name": "33098", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33098" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "samba-winbind-bo(32231)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "name": "1017589", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017589" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded" }, { "name": "22410", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22410" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "24043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24043" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24101" }, { "name": "33098", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33098" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "samba-winbind-bo(32231)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "name": "1017589", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017589" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded" }, { "name": "22410", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22410" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "24043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24043" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-0453", "datePublished": "2007-02-06T02:00:00", "dateReserved": "2007-01-23T00:00:00", "dateUpdated": "2024-08-07T12:19:30.504Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2694
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:08:23.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2011:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "1025852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025852" }, { "name": "JVN#63041502", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN63041502/index.html" }, { "name": "DSA-2290", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2290" }, { "name": "74072", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/74072" }, { "name": "45393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45488" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "48901", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48901" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2011-2694" }, { "name": "USN-1182-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "samba-user-xss(68844)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68844" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722537" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2011:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "1025852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025852" }, { "name": "JVN#63041502", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN63041502/index.html" }, { "name": "DSA-2290", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2290" }, { "name": "74072", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/74072" }, { "name": "45393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45488" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "48901", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48901" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2011-2694" }, { "name": "USN-1182-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "samba-user-xss(68844)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68844" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722537" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2011:121", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "HPSBNS02701", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "1025852", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025852" }, { "name": "JVN#63041502", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN63041502/index.html" }, { "name": "DSA-2290", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2290" }, { "name": "74072", "refsource": "OSVDB", "url": "http://osvdb.org/74072" }, { "name": "45393", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45488" }, { "name": "http://samba.org/samba/history/samba-3.5.10.html", "refsource": "CONFIRM", "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "48901", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48901" }, { "name": "SSRT100598", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=8289", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=8289" }, { "name": "http://www.samba.org/samba/security/CVE-2011-2694", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2011-2694" }, { "name": "USN-1182-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "samba-user-xss(68844)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68844" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=722537", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722537" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2694", "datePublished": "2011-07-29T20:00:00", "dateReserved": "2011-07-11T00:00:00", "dateUpdated": "2024-08-06T23:08:23.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14847
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14847.html" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "samba 4.0.0 before samba 4.9.15, samba 4.10.x before 4.10.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:14.311699", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847" }, { "url": "https://www.samba.org/samba/security/CVE-2019-14847.html" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14847", "datePublished": "2019-11-06T00:00:00", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3961
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6209 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:6744 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7371 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7408 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7464 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7467 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-3961 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241881 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15422 | ||
https://www.samba.org/samba/security/CVE-2023-3961.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:08:50.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3961" }, { "name": "RHBZ#2241881", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15422" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-3961.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-4.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/a:redhat:rhel_eus:9.0::resilientstorage", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-111.el9_0", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-104.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-10-10T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:31:24.691Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3961" }, { "name": "RHBZ#2241881", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15422" }, { "url": "https://www.samba.org/samba/security/CVE-2023-3961.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-10T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: smbd allows client access to unix domain sockets on the file system as root", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-3961", "datePublished": "2023-11-03T12:32:29.558Z", "dateReserved": "2023-07-26T21:21:23.933Z", "dateUpdated": "2024-09-16T14:31:24.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-14746
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2017-14746.html | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2017:3278 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2017/dsa-4043 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2017:3260 | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1039856 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101907 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2017:3261 | vendor-advisory, x_refsource_REDHAT | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201805-07 | vendor-advisory, x_refsource_GENTOO | |
http://www.ubuntu.com/usn/USN-3486-1 | vendor-advisory, x_refsource_UBUNTU | |
https://www.synology.com/support/security/Synology_SA_17_72_Samba | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:39.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-14746.html" }, { "name": "RHSA-2017:3278", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "DSA-4043", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "RHSA-2017:3260", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "name": "1039856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039856" }, { "name": "101907", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101907" }, { "name": "RHSA-2017:3261", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-14746.html" }, { "name": "RHSA-2017:3278", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "DSA-4043", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "RHSA-2017:3260", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "name": "1039856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039856" }, { "name": "101907", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101907" }, { "name": "RHSA-2017:3261", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2017-14746.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-14746.html" }, { "name": "RHSA-2017:3278", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "DSA-4043", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "RHSA-2017:3260", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "name": "1039856", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039856" }, { "name": "101907", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101907" }, { "name": "RHSA-2017:3261", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14746", "datePublished": "2017-11-27T22:00:00", "dateReserved": "2017-09-26T00:00:00", "dateUpdated": "2024-08-05T19:34:39.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10858
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
The Samba Team | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:46.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-10858.html" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "105085", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105085" }, { "name": "1042002", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042002" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858" }, { "name": "RHSA-2018:3470", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Team", "versions": [ { "status": "affected", "version": "4.6.16" }, { "status": "affected", "version": "4.7.9" }, { "status": "affected", "version": "4.8.4" } ] } ], "datePublic": "2018-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:05", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-10858.html" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "105085", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105085" }, { "name": "1042002", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042002" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858" }, { "name": "RHSA-2018:3470", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10858", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.6.16" }, { "version_value": "4.7.9" }, { "version_value": "4.8.4" } ] } } ] }, "vendor_name": "The Samba Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4271", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "RHSA-2018:2613", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "https://www.samba.org/samba/security/CVE-2018-10858.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-10858.html" }, { "name": "USN-3738-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "105085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105085" }, { "name": "1042002", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042002" }, { "name": "RHSA-2018:3056", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "name": "https://security.netapp.com/advisory/ntap-20180814-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858" }, { "name": "RHSA-2018:3470", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3470" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10858", "datePublished": "2018-08-22T17:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:46:46.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0807
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11141", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141" }, { "name": "2004-0046", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba 3.x SMBD Remote Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=139\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "GLSA-200409-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:11141", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141" }, { "name": "2004-0046", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba 3.x SMBD Remote Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=139\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "GLSA-200409-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11141", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141" }, { "name": "2004-0046", "refsource": "TRUSTIX", "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba 3.x SMBD Remote Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=139\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "20041201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "GLSA-200409-16", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0807", "datePublished": "2004-09-14T04:00:00", "dateReserved": "2004-08-25T00:00:00", "dateUpdated": "2024-08-08T00:31:46.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2948
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2009-2948.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "58520", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58520" }, { "name": "1022975", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022975" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "oval:org.mitre.oval:def:7087", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087" }, { "name": "36572", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36572" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "oval:org.mitre.oval:def:10434", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36918" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36893" }, { "name": "samba-mountcifs-info-disclosure(53574)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53574" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36953" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-01T00:00:00", "descriptions": [ { "lang": "en", "value": "mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2009-2948.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "58520", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58520" }, { "name": "1022975", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022975" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "oval:org.mitre.oval:def:7087", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087" }, { "name": "36572", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36572" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "oval:org.mitre.oval:def:10434", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36918" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36893" }, { "name": "samba-mountcifs-info-disclosure(53574)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53574" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36953" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2948", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/security/CVE-2009-2948.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2009-2948.html" }, { "name": "http://news.samba.org/releases/3.4.2/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "FEDORA-2009-10172", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "58520", "refsource": "OSVDB", "url": "http://osvdb.org/58520" }, { "name": "1022975", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022975" }, { "name": "http://news.samba.org/releases/3.2.15/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "oval:org.mitre.oval:def:7087", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087" }, { "name": "36572", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36572" }, { "name": "ADV-2009-2810", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "36937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "http://news.samba.org/releases/3.0.37/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "oval:org.mitre.oval:def:10434", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434" }, { "name": "36918", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36918" }, { "name": "36893", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36893" }, { "name": "samba-mountcifs-info-disclosure(53574)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53574" }, { "name": "http://news.samba.org/releases/3.3.8/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36953" }, { "name": "SUSE-SR:2009:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "FEDORA-2009-10180", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2948", "datePublished": "2009-10-07T18:00:00", "dateReserved": "2009-08-23T00:00:00", "dateUpdated": "2024-08-07T06:07:37.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2127
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6667 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7139 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0423 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0580 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2022-2127 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2222791 | issue-tracking, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2022-2127.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:44.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2127" }, { "name": "RHBZ#2222791", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230731-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5477" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-2127.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-5.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-07-19T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T12:14:52.553Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2022-2127" }, { "name": "RHBZ#2222791", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222791" }, { "url": "https://www.samba.org/samba/security/CVE-2022-2127.html" } ], "timeline": [ { "lang": "en", "time": "2023-07-13T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-07-19T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: out-of-bounds read in winbind auth_crap", "x_redhatCweChain": "CWE-125: Out-of-bounds Read" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-2127", "datePublished": "2023-07-20T14:49:49.422Z", "dateReserved": "2022-06-18T15:45:19.770Z", "dateUpdated": "2024-09-16T12:14:52.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25718
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-25718.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.15.2, samba 4.14.10, samba 4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:27.389457", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726" }, { "url": "https://www.samba.org/samba/security/CVE-2020-25718.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25718", "datePublished": "2022-02-18T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12435
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2019-12435.html | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4018-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/108825 | vdb-entry, x_refsource_BID | |
https://www.synology.com/security/advisory/Synology_SA_19_27 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QSG3TLPZP35RH5DWAIDC7MHXRK5DFKOE/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:40.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-12435.html" }, { "name": "USN-4018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108825", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108825" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" }, { "name": "FEDORA-2019-8966706e33", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QSG3TLPZP35RH5DWAIDC7MHXRK5DFKOE/" }, { "name": "openSUSE-SU-2019:1755", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-20T11:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2019-12435.html" }, { "name": "USN-4018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108825", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108825" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" }, { "name": "FEDORA-2019-8966706e33", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QSG3TLPZP35RH5DWAIDC7MHXRK5DFKOE/" }, { "name": "openSUSE-SU-2019:1755", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2019-12435.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2019-12435.html" }, { "name": "USN-4018-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108825", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108825" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_27", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" }, { "name": "FEDORA-2019-8966706e33", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSG3TLPZP35RH5DWAIDC7MHXRK5DFKOE/" }, { "name": "openSUSE-SU-2019:1755", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12435", "datePublished": "2019-06-19T11:56:01", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:40.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27840
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20210326-0007/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://www.debian.org/security/2021/dsa-4884 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/ | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=1941400 | x_refsource_MISC | |
https://www.samba.org/samba/security/CVE-2020-27840.html | x_refsource_MISC | |
https://security.gentoo.org/glsa/202105-22 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:25:43.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-27840.html" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-26T11:08:39", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-27840.html" }, { "name": "GLSA-202105-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-22" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-27840", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "samba 4.14.1, samba 4.13.6, samba 4.12.13" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20210326-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0007/" }, { "name": "FEDORA-2021-c2d8628d33", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/" }, { "name": "[debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html" }, { "name": "DSA-4884", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4884" }, { "name": "FEDORA-2021-1a8e93a285", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/" }, { "name": "FEDORA-2021-c93a3a5d3f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400" }, { "name": "https://www.samba.org/samba/security/CVE-2020-27840.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-27840.html" }, { "name": "GLSA-202105-22", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-22" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-27840", "datePublished": "2021-05-12T14:06:16", "dateReserved": "2020-10-27T00:00:00", "dateUpdated": "2024-08-04T16:25:43.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3671
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:07.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080%2C" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14770%2C" }, { "tags": [ "x_transferred" ], "url": "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" }, { "name": "DSA-5287", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5287" }, { "name": "[debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221215-0002/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in samba 4.13.12, samba 4.14.8" } ] } ], "descriptions": [ { "lang": "en", "value": "A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-16T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080%2C" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14770%2C" }, { "url": "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" }, { "name": "DSA-5287", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5287" }, { "name": "[debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "url": "https://security.netapp.com/advisory/ntap-20221215-0002/" }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-3671", "datePublished": "2021-10-12T00:00:00", "dateReserved": "2021-07-30T00:00:00", "dateUpdated": "2024-08-03T17:01:07.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16860
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_23" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16860.html" }, { "name": "20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/25" }, { "name": "20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/22" }, { "name": "20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/23" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "openSUSE-SU-2019:1888", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" }, { "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/14" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/11" }, { "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/13" }, { "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT210346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT210348" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT210351" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT210353" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "SAMBA", "versions": [ { "status": "affected", "version": "4.8.x up to, excluding 4.8.12" }, { "status": "affected", "version": "4.9.x up to, excluding 4.9.8" }, { "status": "affected", "version": "4.10.x up to, excluding 4.10.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba\u0027s Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:17", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_23" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2018-16860.html" }, { "name": "20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/25" }, { "name": "20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/22" }, { "name": "20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/23" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "openSUSE-SU-2019:1888", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" }, { "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/14" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/11" }, { "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/13" }, { "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT210346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT210348" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT210351" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT210353" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.8.x up to, excluding 4.8.12" }, { "version_value": "4.9.x up to, excluding 4.9.8" }, { "version_value": "4.10.x up to, excluding 4.10.3" } ] } } ] }, "vendor_name": "SAMBA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in samba\u0027s Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_19_23", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_23" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860" }, { "name": "https://www.samba.org/samba/security/CVE-2018-16860.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2018-16860.html" }, { "name": "20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/25" }, { "name": "20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/22" }, { "name": "20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/23" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "openSUSE-SU-2019:1888", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" }, { "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/14" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/11" }, { "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/13" }, { "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/15" }, { "name": "https://support.apple.com/HT210346", "refsource": "CONFIRM", "url": "https://support.apple.com/HT210346" }, { "name": "https://support.apple.com/HT210348", "refsource": "CONFIRM", "url": "https://support.apple.com/HT210348" }, { "name": "https://support.apple.com/HT210351", "refsource": "CONFIRM", "url": "https://support.apple.com/HT210351" }, { "name": "https://support.apple.com/HT210353", "refsource": "CONFIRM", "url": "https://support.apple.com/HT210353" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16860", "datePublished": "2019-07-31T14:38:36", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0454
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/80970 | vdb-entry, x_refsource_XF | |
https://bugzilla.redhat.com/show_bug.cgi?id=928419 | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-1802-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.ibm.com/support/docview.wss?uid=ssg1S1004289 | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2013-0454 | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=8738 | x_refsource_MISC | |
https://lists.samba.org/archive/samba-announce/2012/000259.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:25:10.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "storwize-cifs-incorrect-permissions(80970)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419" }, { "name": "USN-1802-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1802-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2013-0454" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8738" }, { "name": "[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.samba.org/archive/samba-announce/2012/000259.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or \"hide unreadable\" parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "storwize-cifs-incorrect-permissions(80970)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419" }, { "name": "USN-1802-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1802-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2013-0454" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8738" }, { "name": "[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.samba.org/archive/samba-announce/2012/000259.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2013-0454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or \"hide unreadable\" parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "storwize-cifs-incorrect-permissions(80970)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=928419", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419" }, { "name": "USN-1802-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1802-1" }, { "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289" }, { "name": "https://www.samba.org/samba/security/CVE-2013-0454", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2013-0454" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=8738", "refsource": "MISC", "url": "https://bugzilla.samba.org/show_bug.cgi?id=8738" }, { "name": "[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download", "refsource": "MLIST", "url": "https://lists.samba.org/archive/samba-announce/2012/000259.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2013-0454", "datePublished": "2013-03-26T21:00:00", "dateReserved": "2012-12-16T00:00:00", "dateUpdated": "2024-08-06T14:25:10.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34968
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6667 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7139 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0423 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0580 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-34968 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2222795 | issue-tracking, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2023-34968.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:17:04.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34968" }, { "name": "RHBZ#2222795", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230731-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5477" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-34968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-5.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-07-19T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "providerMetadata": { "dateUpdated": "2024-09-16T12:14:54.671Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34968" }, { "name": "RHBZ#2222795", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795" }, { "url": "https://www.samba.org/samba/security/CVE-2023-34968.html" } ], "timeline": [ { "lang": "en", "time": "2023-07-13T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-07-19T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: spotlight server-side share path disclosure" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-34968", "datePublished": "2023-07-20T14:58:59.825Z", "dateReserved": "2023-06-07T21:11:04.262Z", "dateUpdated": "2024-09-16T12:14:54.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2118
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "86002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/86002" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2118.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "VU#813296", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/813296" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/badlock" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka \"BADLOCK.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-30T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "86002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/86002" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2118.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "VU#813296", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/813296" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/badlock" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka \"BADLOCK.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "86002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/86002" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2118.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2118.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "VU#813296", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/813296" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "https://access.redhat.com/security/vulnerabilities/badlock", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/badlock" }, { "name": "RHSA-2016:0625", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196", "refsource": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "name": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products", "refsource": "CONFIRM", "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2118", "datePublished": "2016-04-12T23:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16857
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106024 | vdb-entry, x_refsource_BID | |
https://www.samba.org/samba/security/CVE-2018-16857.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857" }, { "name": "106024", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106024" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16857.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation\u0027s password policies apply as expected may not have been re-done after the upgrade." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857" }, { "name": "106024", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106024" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-16857.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16857", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation\u0027s password policies apply as expected may not have been re-done after the upgrade." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857" }, { "name": "106024", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106024" }, { "name": "https://www.samba.org/samba/security/CVE-2018-16857.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-16857.html" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16857", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7560
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:28.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "84267", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/84267" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "SUSE-SU-2016:0837", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" }, { "name": "openSUSE-SU-2016:0813", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "name": "openSUSE-SU-2016:0877", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842" }, { "name": "1035220", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035220" }, { "name": "FEDORA-2016-cad77a4576", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html" }, { "name": "SUSE-SU-2016:0814", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-7560.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "FEDORA-2016-4b55f00d00", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html" }, { "name": "FEDORA-2016-ed1587f6ba", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "SUSE-SU-2016:0905", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" }, { "name": "SUSE-SU-2016:0816", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-3514", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3514" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "84267", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/84267" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "SUSE-SU-2016:0837", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" }, { "name": "openSUSE-SU-2016:0813", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "name": "openSUSE-SU-2016:0877", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842" }, { "name": "1035220", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035220" }, { "name": "FEDORA-2016-cad77a4576", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html" }, { "name": "SUSE-SU-2016:0814", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-7560.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "FEDORA-2016-4b55f00d00", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html" }, { "name": "FEDORA-2016-ed1587f6ba", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "SUSE-SU-2016:0905", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" }, { "name": "SUSE-SU-2016:0816", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-3514", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3514" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "84267", "refsource": "BID", "url": "http://www.securityfocus.com/bid/84267" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "SUSE-SU-2016:0837", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" }, { "name": "openSUSE-SU-2016:0813", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "name": "openSUSE-SU-2016:0877", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842" }, { "name": "1035220", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035220" }, { "name": "FEDORA-2016-cad77a4576", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html" }, { "name": "SUSE-SU-2016:0814", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" }, { "name": "https://www.samba.org/samba/security/CVE-2015-7560.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-7560.html" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=11648", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "FEDORA-2016-4b55f00d00", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html" }, { "name": "FEDORA-2016-ed1587f6ba", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "SUSE-SU-2016:0905", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" }, { "name": "SUSE-SU-2016:0816", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" }, { "name": "USN-2922-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-3514", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3514" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-7560", "datePublished": "2016-03-13T22:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:28.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.737Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0288", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0288.html" }, { "name": "30478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30478" }, { "name": "FEDORA-2008-4724", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html" }, { "name": "30396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30396" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "30489", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30489" }, { "name": "ADV-2008-2639", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2639" }, { "name": "1020123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020123" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30835" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "30736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30736" }, { "name": "oval:org.mitre.oval:def:5733", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733" }, { "name": "30385", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30385" }, { "name": "SSA:2008-149-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.473951" }, { "name": "31911", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31911" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "RHSA-2008:0290", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0290.html" }, { "name": "samba-receivesmbraw-bo(42664)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42664" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "5712", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5712" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "ADV-2008-2222", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2222/references" }, { "name": "FEDORA-2008-4797", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html" }, { "name": "FEDORA-2008-4679", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "249086", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1" }, { "name": "30449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30449" }, { "name": "MDVSA-2008:108", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:108" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30802" }, { "name": "33696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33696" }, { "name": "30442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30442" }, { "name": "30543", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30543" }, { "name": "20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/492683/100/0/threaded" }, { "name": "30228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30228" }, { "name": "USN-617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-617-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf" }, { "name": "USN-617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-617-1" }, { "name": "31255", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31255" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0180" }, { "name": "20080529 Secunia Research: Samba \"receive_smb_raw()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/492737/100/0/threaded" }, { "name": "GLSA-200805-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200805-23.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-20/advisory/" }, { "name": "SUSE-SA:2008:026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html" }, { "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html" }, { "name": "oval:org.mitre.oval:def:10020", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020" }, { "name": "xerox-controller-samba-code-execution(45251)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45251" }, { "name": "ADV-2008-1681", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1681" }, { "name": "RHSA-2008:0289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0289.html" }, { "name": "31246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31246" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2008-1105.html" }, { "name": "29404", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29404" }, { "name": "DSA-1590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1590" }, { "name": "20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/492903/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "RHSA-2008:0288", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0288.html" }, { "name": "30478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30478" }, { "name": "FEDORA-2008-4724", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html" }, { "name": "30396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30396" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "30489", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30489" }, { "name": "ADV-2008-2639", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2639" }, { "name": "1020123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020123" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30835" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "30736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30736" }, { "name": "oval:org.mitre.oval:def:5733", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733" }, { "name": "30385", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30385" }, { "name": "SSA:2008-149-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.473951" }, { "name": "31911", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31911" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "RHSA-2008:0290", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0290.html" }, { "name": "samba-receivesmbraw-bo(42664)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42664" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "5712", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5712" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "ADV-2008-2222", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2222/references" }, { "name": "FEDORA-2008-4797", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html" }, { "name": "FEDORA-2008-4679", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "249086", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1" }, { "name": "30449", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30449" }, { "name": "MDVSA-2008:108", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:108" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30802" }, { "name": "33696", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33696" }, { "name": "30442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30442" }, { "name": "30543", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30543" }, { "name": "20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/492683/100/0/threaded" }, { "name": "30228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30228" }, { "name": "USN-617-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-617-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf" }, { "name": "USN-617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-617-1" }, { "name": "31255", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31255" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0180" }, { "name": "20080529 Secunia Research: Samba \"receive_smb_raw()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/492737/100/0/threaded" }, { "name": "GLSA-200805-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200805-23.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-20/advisory/" }, { "name": "SUSE-SA:2008:026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html" }, { "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html" }, { "name": "oval:org.mitre.oval:def:10020", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020" }, { "name": "xerox-controller-samba-code-execution(45251)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45251" }, { "name": "ADV-2008-1681", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1681" }, { "name": "RHSA-2008:0289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0289.html" }, { "name": "31246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31246" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2008-1105.html" }, { "name": "29404", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29404" }, { "name": "DSA-1590", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1590" }, { "name": "20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/492903/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2008-1105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0288", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0288.html" }, { "name": "30478", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30478" }, { "name": "FEDORA-2008-4724", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html" }, { "name": "30396", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30396" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "30489", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30489" }, { "name": "ADV-2008-2639", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2639" }, { "name": "1020123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020123" }, { "name": "30835", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30835" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "30736", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30736" }, { "name": "oval:org.mitre.oval:def:5733", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733" }, { "name": "30385", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30385" }, { "name": "SSA:2008-149-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.473951" }, { "name": "31911", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31911" }, { "name": "ADV-2008-1908", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "RHSA-2008:0290", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0290.html" }, { "name": "samba-receivesmbraw-bo(42664)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42664" }, { "name": "HPSBUX02341", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "5712", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5712" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "ADV-2008-2222", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2222/references" }, { "name": "FEDORA-2008-4797", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html" }, { "name": "FEDORA-2008-4679", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html" }, { "name": "SSRT080075", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "249086", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1" }, { "name": "30449", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30449" }, { "name": "MDVSA-2008:108", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:108" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "33696", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33696" }, { "name": "30442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30442" }, { "name": "30543", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30543" }, { "name": "20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/492683/100/0/threaded" }, { "name": "30228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30228" }, { "name": "USN-617-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-617-2" }, { "name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf" }, { "name": "USN-617-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-617-1" }, { "name": "31255", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31255" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0180", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0180" }, { "name": "20080529 Secunia Research: Samba \"receive_smb_raw()\" Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/492737/100/0/threaded" }, { "name": "GLSA-200805-23", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200805-23.xml" }, { "name": "http://secunia.com/secunia_research/2008-20/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-20/advisory/" }, { "name": "SUSE-SA:2008:026", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html" }, { "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html" }, { "name": "oval:org.mitre.oval:def:10020", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020" }, { "name": "xerox-controller-samba-code-execution(45251)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45251" }, { "name": "ADV-2008-1681", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1681" }, { "name": "RHSA-2008:0289", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0289.html" }, { "name": "31246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31246" }, { "name": "http://www.samba.org/samba/security/CVE-2008-1105.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2008-1105.html" }, { "name": "29404", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29404" }, { "name": "DSA-1590", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1590" }, { "name": "20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/492903/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2008-1105", "datePublished": "2008-05-29T16:00:00", "dateReserved": "2008-02-29T00:00:00", "dateUpdated": "2024-08-07T08:08:57.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2123
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2016-2123.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94970 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2123 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037493 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2123.html" }, { "name": "94970", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94970" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2123" }, { "name": "1037493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037493" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "versions 4.0.0 to 4.5.2" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-02T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2123.html" }, { "name": "94970", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94970" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2123" }, { "name": "1037493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037493" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2123", "datePublished": "2018-11-01T13:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1472
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:39:09.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472" }, { "name": "VU#490028", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/490028" }, { "name": "[oss-security] 20200917 Samba and CVE-2020-1472 (\"Zerologon\")", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2" }, { "name": "USN-4510-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4510-1/" }, { "name": "USN-4510-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4510-2/" }, { "name": "FEDORA-2020-0be2776ed3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/" }, { "name": "openSUSE-SU-2020:1513", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" }, { "name": "openSUSE-SU-2020:1526", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" }, { "name": "FEDORA-2020-77c15664b0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/" }, { "name": "FEDORA-2020-a1d139381a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/" }, { "name": "USN-4559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4559-1/" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_21" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server version 2004", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server, version 1909 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server, version 1903 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server version 20H2", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "datePublic": "2020-08-11T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.\nTo exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.\nMicrosoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.\nFor guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).\nWhen the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.\n" } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T16:32:50.654Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472" }, { "name": "VU#490028", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/490028" }, { "name": "[oss-security] 20200917 Samba and CVE-2020-1472 (\"Zerologon\")", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2" }, { "name": "USN-4510-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4510-1/" }, { "name": "USN-4510-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4510-2/" }, { "name": "FEDORA-2020-0be2776ed3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/" }, { "name": "openSUSE-SU-2020:1513", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" }, { "name": "openSUSE-SU-2020:1526", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" }, { "name": "FEDORA-2020-77c15664b0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/" }, { "name": "FEDORA-2020-a1d139381a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/" }, { "name": "USN-4559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4559-1/" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_21" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html" } ], "title": "Netlogon Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-1472", "datePublished": "2020-08-17T19:13:05", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-08-04T06:39:09.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1642
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29 | x_refsource_MISC | |
http://samba.org/samba/history/samba-3.4.8.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:141 | vendor-advisory, x_refsource_MANDRIVA | |
http://samba.org/samba/history/samba-3.5.2.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=594921 | x_refsource_CONFIRM | |
http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b | x_refsource_CONFIRM | |
http://security-tracker.debian.org/tracker/CVE-2010-1642 | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=7254 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/40097 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2010/1933 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:42.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.4.8.html" }, { "name": "MDVSA-2010:141", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.5.2.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-1642" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7254" }, { "name": "40097", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40097" }, { "name": "ADV-2010-1933", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1933" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \\xff\\xff security blob length in a Session Setup AndX request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-07-30T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.4.8.html" }, { "name": "MDVSA-2010:141", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.5.2.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-1642" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7254" }, { "name": "40097", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40097" }, { "name": "ADV-2010-1933", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1933" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1642", "datePublished": "2010-06-17T16:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:42.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0811
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/536 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:48:38.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "536", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Samba smbd program via a malformed message command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "536", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Samba smbd program via a malformed message command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "536", "refsource": "BID", "url": "http://www.securityfocus.com/bid/536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0811", "datePublished": "2000-01-18T05:00:00", "dateReserved": "1999-11-25T00:00:00", "dateUpdated": "2024-08-01T16:48:38.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14902
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14902.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "all samba 4.11.x versions before 4.11.5" }, { "status": "affected", "version": "all samba 4.10.x versions before 4.10.12" }, { "status": "affected", "version": "all samba 4.9.x versions before 4.9.18" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:21.444367", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2019-14902.html" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902" }, { "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14902", "datePublished": "2020-01-21T00:00:00", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0225
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:44.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-0225.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.18.1, samba 4.17.7, samba 4.16.10" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:22.916445", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2023-0225.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-0225", "datePublished": "2023-04-03T00:00:00", "dateReserved": "2023-01-11T00:00:00", "dateUpdated": "2024-08-02T05:02:44.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2115.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2115.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2115.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2115.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2115", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7540
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:28.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d" }, { "name": "1034492", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034492" }, { "name": "79736", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79736" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-7540.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9d989c9dd7a5b92d0c5d65287935471b83b6e884" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=530d50a1abdcdf4d1775652d4c456c1274d83d8d" }, { "name": "1034492", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034492" }, { "name": "79736", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79736" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-7540.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.samba.org/?p=samba.git;a=commit;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884" }, { "name": "FEDORA-2015-0e0879cc8a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d" }, { "name": "1034492", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034492" }, { "name": "79736", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79736" }, { "name": "https://www.samba.org/samba/security/CVE-2015-7540.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-7540.html" }, { "name": "FEDORA-2015-b36076d32e", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288451" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-7540", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:28.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14628
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20230223-0008/" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13595" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/11/28/4" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions from 4.0.0 onwards" } ] } ], "descriptions": [ { "lang": "en", "value": "An information leak vulnerability was discovered in Samba\u0027s LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.samba.org/show_bug.cgi?id=13595" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445" }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/28/4" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14628", "datePublished": "2023-01-17T00:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:29:51.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16852
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2018-16852.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852 | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106024 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16852.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "106024", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106024" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:07", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-16852.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "106024", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106024" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16852", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2018-16852.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-16852.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852" }, { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "106024", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106024" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16852", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34966
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6667 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7139 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0423 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0580 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4101 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-34966 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2222793 | issue-tracking, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2023-34966 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:17:04.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "name": "RHSA-2024:4101", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:4101" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34966" }, { "name": "RHBZ#2222793", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230731-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5477" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-34966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-5.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-105.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-07-19T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "An infinite loop vulnerability was found in Samba\u0027s mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T12:14:52.686Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "name": "RHSA-2024:4101", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:4101" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34966" }, { "name": "RHBZ#2222793", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793" }, { "url": "https://www.samba.org/samba/security/CVE-2023-34966" } ], "timeline": [ { "lang": "en", "time": "2023-07-13T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-07-19T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: infinite loop in mdssvc rpc service for spotlight", "workarounds": [ { "lang": "en", "value": "As a possible workaround, disable Spotlight by removing all configuration stanzas (\"spotlight=yes|true\") that enable Spotlight ." } ], "x_redhatCweChain": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-34966", "datePublished": "2023-07-20T14:56:14.644Z", "dateReserved": "2023-06-07T21:11:04.261Z", "dateUpdated": "2024-09-16T12:14:52.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2111.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel\u0027s endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2111.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel\u0027s endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2111.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2111.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2111", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10919
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2018/dsa-4271 | vendor-advisory, x_refsource_DEBIAN | |
https://usn.ubuntu.com/3738-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://www.samba.org/samba/security/CVE-2018-10919.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919 | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180814-0001/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105081 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
▼ | Vendor | Product |
---|---|---|
The Samba Team | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-10919.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105081", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105081" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Team", "versions": [ { "status": "affected", "version": "4.6.16" }, { "status": "affected", "version": "4.7.9" }, { "status": "affected", "version": "4.8.4" } ] } ], "datePublic": "2018-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-10919.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105081", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105081" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.6.16" }, { "version_value": "4.7.9" }, { "version_value": "4.8.4" } ] } } ] }, "vendor_name": "The Samba Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-203" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4271", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4271" }, { "name": "USN-3738-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "https://www.samba.org/samba/security/CVE-2018-10919.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-10919.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919" }, { "name": "https://security.netapp.com/advisory/ntap-20180814-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105081", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105081" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10919", "datePublished": "2018-08-22T17:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:54:36.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0926
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:06:52.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[samba-technical] 20100207 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126555346721629\u0026w=2" }, { "name": "39317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39317" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/02/06/3" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126549111204428\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540376915283\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540539117328\u0026w=2" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/03/05/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540477016522\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540248613395\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540290614053\u0026w=2" }, { "name": "20100205 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=126538598820903\u0026w=2" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126548356728379\u0026w=2" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126545363428745\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540475116511\u0026w=2" }, { "name": "[samba-technical] 20100205 Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126539387432412\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540695819735\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126777580624790\u0026w=2" }, { "name": "20100204 Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html" }, { "name": "SUSE-SR:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/news/symlink_attack.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126547903723628\u0026w=2" }, { "name": "[samba-technical] 20100205 re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540011609753\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7104" }, { "name": "[oss-security] 20100205 Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126539592603079\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126540733320471\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540608318301\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540100511357\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540277713815\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126540402215620\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562568" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-15T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[samba-technical] 20100207 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126555346721629\u0026w=2" }, { "name": "39317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39317" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/02/06/3" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126549111204428\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540376915283\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540539117328\u0026w=2" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/03/05/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540477016522\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540248613395\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540290614053\u0026w=2" }, { "name": "20100205 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=126538598820903\u0026w=2" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126548356728379\u0026w=2" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126545363428745\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540475116511\u0026w=2" }, { "name": "[samba-technical] 20100205 Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126539387432412\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540695819735\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126777580624790\u0026w=2" }, { "name": "20100204 Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html" }, { "name": "SUSE-SR:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/news/symlink_attack.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126547903723628\u0026w=2" }, { "name": "[samba-technical] 20100205 re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540011609753\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7104" }, { "name": "[oss-security] 20100205 Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126539592603079\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126540733320471\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540608318301\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540100511357\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-technical\u0026m=126540277713815\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126540402215620\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562568" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[samba-technical] 20100207 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126555346721629\u0026w=2" }, { "name": "39317", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39317" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/02/06/3" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126549111204428\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540376915283\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540539117328\u0026w=2" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/03/05/3" }, { "name": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html", "refsource": "MISC", "url": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540477016522\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540248613395\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540290614053\u0026w=2" }, { "name": "20100205 Re: Samba Remote Zero-Day Exploit", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=126538598820903\u0026w=2" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126548356728379\u0026w=2" }, { "name": "[oss-security] 20100206 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=126545363428745\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540475116511\u0026w=2" }, { "name": "[samba-technical] 20100205 Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126539387432412\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540695819735\u0026w=2" }, { "name": "http://gitweb.samba.org/?p=samba.git;a=commit;h=bd269443e311d96ef495a9db47d1b95eb83bb8f4", "refsource": "CONFIRM", "url": "http://gitweb.samba.org/?p=samba.git;a=commit;h=bd269443e311d96ef495a9db47d1b95eb83bb8f4" }, { "name": "[oss-security] 20100305 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=126777580624790\u0026w=2" }, { "name": "20100204 Samba Remote Zero-Day Exploit", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html" }, { "name": "SUSE-SR:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "name": "http://www.samba.org/samba/news/symlink_attack.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/news/symlink_attack.html" }, { "name": "SUSE-SR:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "[samba-technical] 20100206 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126547903723628\u0026w=2" }, { "name": "[samba-technical] 20100205 re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540011609753\u0026w=2" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=7104", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=7104" }, { "name": "[oss-security] 20100205 Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=126539592603079\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=126540733320471\u0026w=2" }, { "name": "20100204 Re: Samba Remote Zero-Day Exploit", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540608318301\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540100511357\u0026w=2" }, { "name": "[samba-technical] 20100205 Re: Claimed Zero Day exploit in Samba.", "refsource": "MLIST", "url": "http://marc.info/?l=samba-technical\u0026m=126540277713815\u0026w=2" }, { "name": "[oss-security] 20100205 Re: Samba symlink 0day flaw", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=126540402215620\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=562568", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562568" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0926", "datePublished": "2010-03-09T19:00:00", "dateReserved": "2010-03-05T00:00:00", "dateUpdated": "2024-08-07T01:06:52.565Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1182
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:53:36.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2012:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.6.4.html" }, { "name": "SUSE-SU-2012:0501", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2012-1182" }, { "name": "48751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48751" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "DSA-2450", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2450" }, { "name": "HPSBUX02789", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "name": "48844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48844" }, { "name": "USN-1423-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1423-1" }, { "name": "FEDORA-2012-5793", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html" }, { "name": "FEDORA-2012-5805", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html" }, { "name": "48816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48816" }, { "name": "FEDORA-2012-5843", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html" }, { "name": "HPSBMU02790", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "name": "SUSE-SU-2012:0504", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48879" }, { "name": "48754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48754" }, { "name": "FEDORA-2012-6382", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html" }, { "name": "1026913", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026913" }, { "name": "48818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578" }, { "name": "48999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48999" }, { "name": "SSRT100872", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "SSRT100824", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "48873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48873" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2012:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.6.4.html" }, { "name": "SUSE-SU-2012:0501", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2012-1182" }, { "name": "48751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48751" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "DSA-2450", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2450" }, { "name": "HPSBUX02789", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "name": "48844", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48844" }, { "name": "USN-1423-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1423-1" }, { "name": "FEDORA-2012-5793", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html" }, { "name": "FEDORA-2012-5805", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html" }, { "name": "48816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48816" }, { "name": "FEDORA-2012-5843", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html" }, { "name": "HPSBMU02790", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "name": "SUSE-SU-2012:0504", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48879" }, { "name": "48754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48754" }, { "name": "FEDORA-2012-6382", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html" }, { "name": "1026913", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026913" }, { "name": "48818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578" }, { "name": "48999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48999" }, { "name": "SSRT100872", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "SSRT100824", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "48873", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48873" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2012:055", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055" }, { "name": "http://www.samba.org/samba/history/samba-3.6.4.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-3.6.4.html" }, { "name": "SUSE-SU-2012:0501", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" }, { "name": "https://www.samba.org/samba/security/CVE-2012-1182", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2012-1182" }, { "name": "48751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48751" }, { "name": "SUSE-SU-2012:0515", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "DSA-2450", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2450" }, { "name": "HPSBUX02789", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "SUSE-SU-2012:0502", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "name": "48844", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48844" }, { "name": "USN-1423-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1423-1" }, { "name": "FEDORA-2012-5793", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html" }, { "name": "FEDORA-2012-5805", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html" }, { "name": "48816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48816" }, { "name": "FEDORA-2012-5843", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html" }, { "name": "HPSBMU02790", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "name": "SUSE-SU-2012:0504", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" }, { "name": "48879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48879" }, { "name": "48754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48754" }, { "name": "FEDORA-2012-6382", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html" }, { "name": "1026913", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026913" }, { "name": "48818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48818" }, { "name": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578", "refsource": "CONFIRM", "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578" }, { "name": "48999", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48999" }, { "name": "SSRT100872", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "SSRT100824", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "48873", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48873" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1182", "datePublished": "2012-04-10T21:00:00", "dateReserved": "2012-02-14T00:00:00", "dateUpdated": "2024-08-06T18:53:36.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1050
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:12.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3595-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3595-2/" }, { "name": "103387", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103387" }, { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "RHSA-2018:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1883" }, { "name": "DSA-4135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4135" }, { "name": "USN-3595-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3595-1/" }, { "name": "RHSA-2018:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1860" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "1040493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040493" }, { "name": "[debian-lts-announce] 20180327 [SECURITY] [DLA 1320-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-1050.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03834en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180313-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "All versions of Samba from 4.0.0 onwards" } ] } ], "datePublic": "2018-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-04T18:00:58", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-3595-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3595-2/" }, { "name": "103387", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103387" }, { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "RHSA-2018:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1883" }, { "name": "DSA-4135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4135" }, { "name": "USN-3595-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3595-1/" }, { "name": "RHSA-2018:1860", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1860" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "1040493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040493" }, { "name": "[debian-lts-announce] 20180327 [SECURITY] [DLA 1320-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-1050.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03834en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180313-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2018-03-13T00:00:00", "ID": "CVE-2018-1050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samba", "version": { "version_data": [ { "version_value": "All versions of Samba from 4.0.0 onwards" } ] } } ] }, "vendor_name": "Samba" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3595-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3595-2/" }, { "name": "103387", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103387" }, { "name": "RHSA-2018:2613", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "RHSA-2018:2612", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "RHSA-2018:1883", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1883" }, { "name": "DSA-4135", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4135" }, { "name": "USN-3595-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3595-1/" }, { "name": "RHSA-2018:1860", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1860" }, { "name": "RHSA-2018:3056", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "name": "GLSA-201805-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "1040493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040493" }, { "name": "[debian-lts-announce] 20180327 [SECURITY] [DLA 1320-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://www.samba.org/samba/security/CVE-2018-1050.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-1050.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03834en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03834en_us" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538771" }, { "name": "https://security.netapp.com/advisory/ntap-20180313-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180313-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1050", "datePublished": "2018-03-13T16:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-09-16T23:16:06.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2063
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:17:13.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "samba-smb1-code-execution(59481)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59481" }, { "name": "65518", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/65518" }, { "name": "HPSBUX02609", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2" }, { "name": "40884", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40884" }, { "name": "[samba-announce] 20100616 Samba 3.3.13 Security Release Available for Download", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=samba-announce\u0026m=127668712312761\u0026w=2" }, { "name": "40210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40210" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/history/samba-3.3.13.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch" }, { "name": "40145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40145" }, { "name": "ADV-2010-1507", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1507" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch" }, { "name": "ADV-2010-1505", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1505" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "40293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40293" }, { "name": "DSA-2061", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2061" }, { "name": "USN-951-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-951-1" }, { "name": "MDVSA-2010:119", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:119" }, { "name": "APPLE-SA-2010-08-24-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" }, { "name": "SSRT100147", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2" }, { "name": "40221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40221" }, { "name": "ADV-2010-1504", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4312" }, { "name": "oval:org.mitre.oval:def:9859", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859" }, { "name": "RHSA-2010:0488", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0488.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "ADV-2010-1486", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1486" }, { "name": "42319", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42319" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2010-2063.html" }, { "name": "oval:org.mitre.oval:def:12427", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427" }, { "name": "1024107", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024107" }, { "name": "ADV-2010-1517", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1517" }, { "name": "ADV-2010-3063", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3063" }, { "name": "oval:org.mitre.oval:def:7115", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115" }, { "name": "20100616 Samba 3.3.12 Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873" }, { "name": "SSA:2010-169-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.471914" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "samba-smb1-code-execution(59481)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59481" }, { "name": "65518", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/65518" }, { "name": "HPSBUX02609", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2" }, { "name": "40884", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40884" }, { "name": "[samba-announce] 20100616 Samba 3.3.13 Security Release Available for Download", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=samba-announce\u0026m=127668712312761\u0026w=2" }, { "name": "40210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40210" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/history/samba-3.3.13.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch" }, { "name": "40145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40145" }, { "name": "ADV-2010-1507", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1507" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch" }, { "name": "ADV-2010-1505", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1505" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "40293", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40293" }, { "name": "DSA-2061", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2061" }, { "name": "USN-951-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-951-1" }, { "name": "MDVSA-2010:119", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:119" }, { "name": "APPLE-SA-2010-08-24-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" }, { "name": "SSRT100147", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2" }, { "name": "40221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40221" }, { "name": "ADV-2010-1504", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4312" }, { "name": "oval:org.mitre.oval:def:9859", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859" }, { "name": "RHSA-2010:0488", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0488.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "ADV-2010-1486", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1486" }, { "name": "42319", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42319" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2010-2063.html" }, { "name": "oval:org.mitre.oval:def:12427", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427" }, { "name": "1024107", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024107" }, { "name": "ADV-2010-1517", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1517" }, { "name": "ADV-2010-3063", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3063" }, { "name": "oval:org.mitre.oval:def:7115", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115" }, { "name": "20100616 Samba 3.3.12 Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873" }, { "name": "SSA:2010-169-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.471914" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2063", "datePublished": "2010-06-17T16:00:00", "dateReserved": "2010-05-25T00:00:00", "dateUpdated": "2024-08-07T02:17:13.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6015
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:25.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:1117", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1117.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307430" }, { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "28891", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28891" }, { "name": "1019295", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29341" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "VU#438395", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/438395" }, { "name": "26791", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26791" }, { "name": "238251", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1" }, { "name": "SUSE-SA:2007:068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_68_samba.html" }, { "name": "USN-556-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-556-1" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "ADV-2008-0495", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0495/references" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "27999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27999" }, { "name": "20071214 POC for samba send_mailslot()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485144/100/0/threaded" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30484" }, { "name": "29032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29032" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2007-6015.html" }, { "name": "27993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27993" }, { "name": "samba-sendmailslot-bo(38965)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38965" }, { "name": "DSA-1427", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1427" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "MDKSA-2007:244", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:244" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=200773" }, { "name": "20071210 Secunia Research: Samba \"send_mailslot()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/484818/100/0/threaded" }, { "name": "1019065", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019065" }, { "name": "27977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27977" }, { "name": "ADV-2008-0637", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "28029", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28029" }, { "name": "ADV-2007-4153", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4153" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm" }, { "name": "28089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28089" }, { "name": "28003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1976" }, { "name": "TA08-043B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043B.html" }, { "name": "RHSA-2007:1114", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1114.html" }, { "name": "3438", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3438" }, { "name": "SSA:2007-344-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.451554" }, { "name": "FEDORA-2007-4269", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html" }, { "name": "FEDORA-2007-4275", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html" }, { "name": "27894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27894" }, { "name": "APPLE-SA-2008-02-11", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" }, { "name": "27760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27760" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2007-99/advisory/" }, { "name": "28067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28067" }, { "name": "28037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28037" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "20071210 [SECURITY] Buffer overrun in send_mailslot()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/484825/100/0/threaded" }, { "name": "20071210 rPSA-2007-0261-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/484827/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11572", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572" }, { "name": "28028", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28028" }, { "name": "oval:org.mitre.oval:def:5605", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605" }, { "name": "GLSA-200712-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200712-10.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the \"domain logons\" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "RHSA-2007:1117", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1117.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307430" }, { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "28891", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28891" }, { "name": "1019295", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29341" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "VU#438395", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/438395" }, { "name": "26791", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26791" }, { "name": "238251", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1" }, { "name": "SUSE-SA:2007:068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_68_samba.html" }, { "name": "USN-556-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-556-1" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "ADV-2008-0495", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0495/references" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "27999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27999" }, { "name": "20071214 POC for samba send_mailslot()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485144/100/0/threaded" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30484" }, { "name": "29032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29032" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2007-6015.html" }, { "name": "27993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27993" }, { "name": "samba-sendmailslot-bo(38965)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38965" }, { "name": "DSA-1427", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1427" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "MDKSA-2007:244", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:244" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=200773" }, { "name": "20071210 Secunia Research: Samba \"send_mailslot()\" Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/484818/100/0/threaded" }, { "name": "1019065", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019065" }, { "name": "27977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27977" }, { "name": "ADV-2008-0637", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "28029", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28029" }, { "name": "ADV-2007-4153", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4153" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm" }, { "name": "28089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28089" }, { "name": "28003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1976" }, { "name": "TA08-043B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043B.html" }, { "name": "RHSA-2007:1114", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1114.html" }, { "name": "3438", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3438" }, { "name": "SSA:2007-344-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.451554" }, { "name": "FEDORA-2007-4269", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html" }, { "name": "FEDORA-2007-4275", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html" }, { "name": "27894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27894" }, { "name": "APPLE-SA-2008-02-11", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" }, { "name": "27760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27760" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2007-99/advisory/" }, { "name": "28067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28067" }, { "name": "28037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28037" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "20071210 [SECURITY] Buffer overrun in send_mailslot()", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/484825/100/0/threaded" }, { "name": "20071210 rPSA-2007-0261-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/484827/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11572", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572" }, { "name": "28028", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28028" }, { "name": "oval:org.mitre.oval:def:5605", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605" }, { "name": "GLSA-200712-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200712-10.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2007-6015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the \"domain logons\" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:1117", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1117.html" }, { "name": "http://docs.info.apple.com/article.html?artnum=307430", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307430" }, { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "28891", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28891" }, { "name": "1019295", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1" }, { "name": "30835", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29341" }, { "name": "HPSBUX02316", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "VU#438395", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/438395" }, { "name": "26791", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26791" }, { "name": "238251", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1" }, { "name": "SUSE-SA:2007:068", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_68_samba.html" }, { "name": "USN-556-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-556-1" }, { "name": "ADV-2008-1908", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "ADV-2008-0495", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0495/references" }, { "name": "SSRT071495", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "27999", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27999" }, { "name": "20071214 POC for samba send_mailslot()", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/485144/100/0/threaded" }, { "name": "30484", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30484" }, { "name": "29032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29032" }, { "name": "http://www.samba.org/samba/security/CVE-2007-6015.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2007-6015.html" }, { "name": "27993", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27993" }, { "name": "samba-sendmailslot-bo(38965)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38965" }, { "name": "DSA-1427", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1427" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "MDKSA-2007:244", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:244" }, { "name": "SSRT080075", "refsource": "HP", "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=200773", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=200773" }, { "name": "20071210 Secunia Research: Samba \"send_mailslot()\" Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/484818/100/0/threaded" }, { "name": "1019065", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019065" }, { "name": "27977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27977" }, { "name": "ADV-2008-0637", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "28029", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28029" }, { "name": "ADV-2007-4153", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4153" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm" }, { "name": "28089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28089" }, { "name": "28003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28003" }, { "name": "https://issues.rpath.com/browse/RPL-1976", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1976" }, { "name": "TA08-043B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-043B.html" }, { "name": "RHSA-2007:1114", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1114.html" }, { "name": "3438", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3438" }, { "name": "SSA:2007-344-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.451554" }, { "name": "FEDORA-2007-4269", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html" }, { "name": "FEDORA-2007-4275", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html" }, { "name": "27894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27894" }, { "name": "APPLE-SA-2008-02-11", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html" }, { "name": "27760", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27760" }, { "name": "ADV-2008-1712", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "http://secunia.com/secunia_research/2007-99/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2007-99/advisory/" }, { "name": "28067", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28067" }, { "name": "28037", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28037" }, { "name": "ADV-2008-0859", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "20071210 [SECURITY] Buffer overrun in send_mailslot()", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/484825/100/0/threaded" }, { "name": "20071210 rPSA-2007-0261-1 samba samba-swat", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/484827/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11572", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572" }, { "name": "28028", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28028" }, { "name": "oval:org.mitre.oval:def:5605", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605" }, { "name": "GLSA-200712-10", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200712-10.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2007-6015", "datePublished": "2007-12-13T21:00:00", "dateReserved": "2007-11-19T00:00:00", "dateUpdated": "2024-08-07T15:54:25.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0728
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.samba.org/archive/samba-announce/2010/000211.html | mailing-list, x_refsource_MLIST | |
http://www.samba.org/samba/security/CVE-2010-0728 | x_refsource_CONFIRM | |
http://www.samba.org/samba/history/samba-3.4.7.html | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=7222 | x_refsource_CONFIRM | |
http://www.samba.org/samba/history/samba-3.3.12.html | x_refsource_CONFIRM | |
http://www.samba.org/samba/history/samba-3.5.1.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:59:38.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[samba-announce] 20100308 Security problem with Samba on Linux - affects 3.5.0, 3.4.6 and 3.3.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.samba.org/archive/samba-announce/2010/000211.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2010-0728" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.4.7.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7222" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.3.12.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.5.1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-03-09T19:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[samba-announce] 20100308 Security problem with Samba on Linux - affects 3.5.0, 3.4.6 and 3.3.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.samba.org/archive/samba-announce/2010/000211.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2010-0728" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.4.7.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=7222" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.3.12.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.5.1.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-0728", "datePublished": "2010-03-09T19:00:00Z", "dateReserved": "2010-02-26T00:00:00Z", "dateUpdated": "2024-08-07T00:59:38.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0336
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:25:40.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-0336.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14950" }, { "tags": [ "x_transferred" ], "url": "https://github.com/samba-team/samba/commit/1a5dc817c0c9379bbaab14c676681b42b0039a3c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/samba-team/samba/commit/c58ede44f382bd0125f761f0479c8d48156be400" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0336" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects Samba v4.0.0 and later, Fixed in samba v4.13.17, v4.14.12, v4.15.4." } ] } ], "descriptions": [ { "lang": "en", "value": "The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 - Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:53.455235", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-0336.html" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14950" }, { "url": "https://github.com/samba-team/samba/commit/1a5dc817c0c9379bbaab14c676681b42b0039a3c" }, { "url": "https://github.com/samba-team/samba/commit/c58ede44f382bd0125f761f0479c8d48156be400" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046134" }, { "url": "https://access.redhat.com/security/cve/CVE-2022-0336" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-0336", "datePublished": "2022-08-29T00:00:00", "dateReserved": "2022-01-21T00:00:00", "dateUpdated": "2024-08-02T23:25:40.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79729" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-5299.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79729" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-5299.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-0e0879cc8a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79729" }, { "name": "SUSE-SU-2016:0164", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "https://www.samba.org/samba/security/CVE-2015-5299.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-5299.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5299", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4496
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:15.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.1.6.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-4496" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.0.16.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "openSUSE-SU-2014:0404", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "66336", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66336" }, { "name": "RHSA-2014:0330", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html" }, { "name": "USN-2156-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2156-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.6.23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.1.6.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-4496" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.0.16.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "openSUSE-SU-2014:0404", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "66336", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66336" }, { "name": "RHSA-2014:0330", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html" }, { "name": "USN-2156-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2156-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.6.23.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4496", "datePublished": "2014-03-14T10:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:15.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1288
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/1406 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/11397 | mailing-list, x_refsource_BUGTRAQ | |
http://www.caldera.com/support/security/advisories/SA-1998.35.txt | vendor-advisory, x_refsource_CALDERA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:02.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "samba-wsmbconf(1406)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1406" }, { "name": "19981119 Vulnerability in Samba on RedHat, Caldera and PHT TurboLinux", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/11397" }, { "name": "SA-1998.35", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.caldera.com/support/security/advisories/SA-1998.35.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "samba-wsmbconf(1406)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1406" }, { "name": "19981119 Vulnerability in Samba on RedHat, Caldera and PHT TurboLinux", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/11397" }, { "name": "SA-1998.35", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.caldera.com/support/security/advisories/SA-1998.35.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "samba-wsmbconf(1406)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1406" }, { "name": "19981119 Vulnerability in Samba on RedHat, Caldera and PHT TurboLinux", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/11397" }, { "name": "SA-1998.35", "refsource": "CALDERA", "url": "http://www.caldera.com/support/security/advisories/SA-1998.35.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1288", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:02.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3824
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html | mailing-list, x_refsource_MLIST | |
https://www.debian.org/security/2019/dsa-4397 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.samba.org/show_bug.cgi?id=13773 | x_refsource_MISC | |
https://usn.ubuntu.com/3895-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/107347 | vdb-entry, x_refsource_BID | |
https://security.netapp.com/advisory/ntap-20190226-0001/ | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html" }, { "name": "DSA-4397", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4397" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13773" }, { "name": "USN-3895-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3895-1/" }, { "name": "107347", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107347" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190226-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824" }, { "name": "openSUSE-SU-2019:1163", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-05T16:06:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html" }, { "name": "DSA-4397", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4397" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13773" }, { "name": "USN-3895-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3895-1/" }, { "name": "107347", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107347" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190226-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824" }, { "name": "openSUSE-SU-2019:1163", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00000.html" }, { "name": "DSA-4397", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4397" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=13773", "refsource": "MISC", "url": "https://bugzilla.samba.org/show_bug.cgi?id=13773" }, { "name": "USN-3895-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3895-1/" }, { "name": "107347", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107347" }, { "name": "https://security.netapp.com/advisory/ntap-20190226-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190226-0001/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824" }, { "name": "openSUSE-SU-2019:1163", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3824", "datePublished": "2019-03-06T15:00:00", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1154
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:00.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CAN-2004-1154.html" }, { "name": "101643", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1" }, { "name": "oval:org.mitre.oval:def:10236", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236" }, { "name": "11973", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11973" }, { "name": "samba-msrpc-heap-corruption(18519)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18519" }, { "name": "RHSA-2005:020", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-020.html" }, { "name": "oval:org.mitre.oval:def:642", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642" }, { "name": "13453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13453/" }, { "name": "DSA-701", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-701" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "57730", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1" }, { "name": "20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities" }, { "name": "SUSE-SA:2004:045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html" }, { "name": "oval:org.mitre.oval:def:1459", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "VU#226184", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/226184" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CAN-2004-1154.html" }, { "name": "101643", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1" }, { "name": "oval:org.mitre.oval:def:10236", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236" }, { "name": "11973", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11973" }, { "name": "samba-msrpc-heap-corruption(18519)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18519" }, { "name": "RHSA-2005:020", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-020.html" }, { "name": "oval:org.mitre.oval:def:642", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642" }, { "name": "13453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13453/" }, { "name": "DSA-701", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-701" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "57730", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1" }, { "name": "20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities" }, { "name": "SUSE-SA:2004:045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html" }, { "name": "oval:org.mitre.oval:def:1459", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "VU#226184", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/226184" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/security/CAN-2004-1154.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CAN-2004-1154.html" }, { "name": "101643", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1" }, { "name": "oval:org.mitre.oval:def:10236", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236" }, { "name": "11973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11973" }, { "name": "samba-msrpc-heap-corruption(18519)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18519" }, { "name": "RHSA-2005:020", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-020.html" }, { "name": "oval:org.mitre.oval:def:642", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642" }, { "name": "13453", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13453/" }, { "name": "DSA-701", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-701" }, { "name": "APPLE-SA-2005-03-21", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "57730", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1" }, { "name": "20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities" }, { "name": "SUSE-SA:2004:045", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html" }, { "name": "oval:org.mitre.oval:def:1459", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459" }, { "name": "SCOSA-2005.17", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "VU#226184", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/226184" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1154", "datePublished": "2004-12-22T05:00:00", "dateReserved": "2004-12-07T00:00:00", "dateUpdated": "2024-08-08T00:39:00.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8467
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:42.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79735", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79735" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-8467.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "79735", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79735" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-8467.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79735", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79735" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "https://www.samba.org/samba/security/CVE-2015-8467.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-8467.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8467", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-12-04T00:00:00", "dateUpdated": "2024-08-06T08:20:42.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0082
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/9637 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15132 | vdb-entry, x_refsource_XF | |
http://www.ciac.org/ciac/bulletins/o-078.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827 | vdb-entry, signature, x_refsource_OVAL | |
http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2004-064.html | vendor-advisory, x_refsource_REDHAT | |
http://www.osvdb.org/3919 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "9637", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9637" }, { "name": "samba-mksmbpasswd-gain-access(15132)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15132" }, { "name": "O-078", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-078.shtml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html" }, { "name": "oval:org.mitre.oval:def:827", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt" }, { "name": "RHSA-2004:064", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-064.html" }, { "name": "3919", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3919" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-07-17T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "9637", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9637" }, { "name": "samba-mksmbpasswd-gain-access(15132)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15132" }, { "name": "O-078", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-078.shtml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html" }, { "name": "oval:org.mitre.oval:def:827", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt" }, { "name": "RHSA-2004:064", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-064.html" }, { "name": "3919", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3919" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "9637", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9637" }, { "name": "samba-mksmbpasswd-gain-access(15132)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15132" }, { "name": "O-078", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-078.shtml" }, { "name": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html", "refsource": "CONFIRM", "url": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html" }, { "name": "oval:org.mitre.oval:def:827", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827" }, { "name": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt", "refsource": "CONFIRM", "url": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt" }, { "name": "RHSA-2004:064", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-064.html" }, { "name": "3919", "refsource": "OSVDB", "url": "http://www.osvdb.org/3919" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0082", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2004-01-19T00:00:00", "dateUpdated": "2024-08-08T00:01:23.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-0771
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html | vendor-advisory, x_refsource_SUSE | |
https://www.samba.org/samba/security/CVE-2016-0771.html | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=11128 | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=11686 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/84273 | vdb-entry, x_refsource_BID | |
http://www.ubuntu.com/usn/USN-2922-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2016/dsa-3514 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securitytracker.com/id/1035219 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:0813", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-0771.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686" }, { "name": "84273", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/84273" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-3514", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3514" }, { "name": "1035219", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035219" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2016:0813", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-0771.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686" }, { "name": "84273", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/84273" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-3514", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3514" }, { "name": "1035219", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035219" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0771", "datePublished": "2016-03-13T22:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0808
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.trustix.net/errata/2004/0046/ | vendor-advisory, x_refsource_TRUSTIX | |
http://www.redhat.com/support/errata/RHSA-2004-467.html | vendor-advisory, x_refsource_REDHAT | |
http://www.idefense.com/application/poi/display?id=138&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://marc.info/?l=bugtraq&m=109509335230495&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=bugtraq&m=109526231623307&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092 | vendor-advisory, x_refsource_MANDRAKE | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344 | vdb-entry, signature, x_refsource_OVAL | |
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2004-0046", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba nmbd Invalid Length Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=138\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "oval:org.mitre.oval:def:10344", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344" }, { "name": "GLSA-200409-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2004-0046", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba nmbd Invalid Length Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=138\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "oval:org.mitre.oval:def:10344", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344" }, { "name": "GLSA-200409-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0808", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2004-0046", "refsource": "TRUSTIX", "url": "http://www.trustix.net/errata/2004/0046/" }, { "name": "RHSA-2004:467", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html" }, { "name": "20040913 Samba nmbd Invalid Length Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=138\u0026type=vulnerabilities" }, { "name": "20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 \u0026 CAN-2004-0808)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2" }, { "name": "20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2" }, { "name": "CLA-2004:873", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "MDKSA-2004:092", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092" }, { "name": "oval:org.mitre.oval:def:10344", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344" }, { "name": "GLSA-200409-16", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0808", "datePublished": "2004-09-14T04:00:00", "dateReserved": "2004-08-25T00:00:00", "dateUpdated": "2024-08-08T00:31:46.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3069
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "42885", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42885" }, { "name": "ADV-2010-2378", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2378" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "FEDORA-2010-14678", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2010-3069.html" }, { "name": "41354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41354" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "samba-sidparse-bo(61773)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61773" }, { "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "name": "USN-987-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-987-1" }, { "name": "1024434", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024434" }, { "name": "41447", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41447" }, { "name": "FEDORA-2010-14627", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html" }, { "name": "42531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42531" }, { "name": "ADV-2010-3126", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/history/samba-3.5.5.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "43212", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43212" }, { "name": "ADV-2011-0091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0091" }, { "name": "FEDORA-2010-14768", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html" }, { "name": "SUSE-SR:2010:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "name": "RHSA-2010:0860", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0860.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX02657", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "42885", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42885" }, { "name": "ADV-2010-2378", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2378" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "FEDORA-2010-14678", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2010-3069.html" }, { "name": "41354", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41354" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSRT100460", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "samba-sidparse-bo(61773)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61773" }, { "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "name": "USN-987-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-987-1" }, { "name": "1024434", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024434" }, { "name": "41447", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41447" }, { "name": "FEDORA-2010-14627", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html" }, { "name": "42531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42531" }, { "name": "ADV-2010-3126", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/history/samba-3.5.5.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "43212", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43212" }, { "name": "ADV-2011-0091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0091" }, { "name": "FEDORA-2010-14768", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html" }, { "name": "SUSE-SR:2010:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "name": "RHSA-2010:0860", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0860.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4581" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3069", "datePublished": "2010-09-15T17:26:00", "dateReserved": "2010-08-20T00:00:00", "dateUpdated": "2024-08-07T02:55:46.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44141
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2021-44141.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:17:24.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-44141.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Samba prior to 4.15.5" } ] } ], "descriptions": [ { "lang": "en", "value": "All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:12.738945", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2021-44141.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-44141", "datePublished": "2022-02-21T00:00:00", "dateReserved": "2021-11-22T00:00:00", "dateUpdated": "2024-08-04T04:17:24.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0829
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/lists/bugtraq/2004/Sep/0003.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.trustix.org/errata/2004/0043 | vendor-advisory, x_refsource_TRUSTIX | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17138 | vdb-entry, x_refsource_XF | |
http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml | vendor-advisory, x_refsource_GENTOO | |
http://samba.org/samba/history/samba-2.2.11.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040831 Samba FindNextPrintChangeNotify() Error Lets Remote Authenticated Users Crash smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://seclists.org/lists/bugtraq/2004/Sep/0003.html" }, { "name": "2004-0043", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0043" }, { "name": "samba-findnextprintchangenotify-dos(17138)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17138" }, { "name": "GLSA-200409-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-2.2.11.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040831 Samba FindNextPrintChangeNotify() Error Lets Remote Authenticated Users Crash smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://seclists.org/lists/bugtraq/2004/Sep/0003.html" }, { "name": "2004-0043", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0043" }, { "name": "samba-findnextprintchangenotify-dos(17138)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17138" }, { "name": "GLSA-200409-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-2.2.11.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0829", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040831 Samba FindNextPrintChangeNotify() Error Lets Remote Authenticated Users Crash smbd", "refsource": "BUGTRAQ", "url": "http://seclists.org/lists/bugtraq/2004/Sep/0003.html" }, { "name": "2004-0043", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0043" }, { "name": "samba-findnextprintchangenotify-dos(17138)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17138" }, { "name": "GLSA-200409-14", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml" }, { "name": "http://samba.org/samba/history/samba-2.2.11.html", "refsource": "CONFIRM", "url": "http://samba.org/samba/history/samba-2.2.11.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0829", "datePublished": "2004-09-10T04:00:00", "dateReserved": "2004-09-02T00:00:00", "dateUpdated": "2024-08-08T00:31:47.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0614
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-0614.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "FEDORA-2023-1c172e3264", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.18.1, samba 4.17.7, samba 4.16.10" } ] } ], "descriptions": [ { "lang": "en", "value": "The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:14.183896", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2023-0614.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "FEDORA-2023-1c172e3264", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-0614", "datePublished": "2023-04-03T00:00:00", "dateReserved": "2023-02-01T00:00:00", "dateUpdated": "2024-08-02T05:17:50.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "20070515 ZDI-07-032: Samba sec_io_acl Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468672/100/0/threaded" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "20070515 ZDI-07-031: Samba smb_io_notify_option_type_data Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468673/100/0/threaded" }, { "name": "20070515 ZDI-07-029: Samba lsa_io_privilege_set Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468674/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2007-2446.html" }, { "name": "samba-lsaiotransnames-bo(34316)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25257" }, { "name": "25391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25391/" }, { "name": "24198", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24198" }, { "name": "20070515 ZDI-07-030: Samba netdfs_io_dfs_EnumInfo_d Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468675/100/0/threaded" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "APPLE-SA-2007-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "samba-secioacl-bo(34314)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34314" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-033.html" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "samba-netdfsiodfsenuminfod-bo(34311)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34311" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "samba-smbionotifyoptiontypedata-bo(34312)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34312" }, { "name": "2702", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2702" }, { "name": "25567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25567" }, { "name": "34731", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34731" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-031.html" }, { "name": "34699", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34699" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28292" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25259" }, { "name": "samba-lsaioprivilegeset-bo(34309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34309" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34732", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/34732" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468542/100/0/threaded" }, { "name": "1018050", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018050" }, { "name": "23973", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23973" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-030.html" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "VU#773720", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/773720" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25246" }, { "name": "20070515 ZDI-07-033: Samba lsa_io_trans_names Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468680/100/0/threaded" }, { "name": "24197", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24197" }, { "name": "34733", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34733" }, { "name": "oval:org.mitre.oval:def:11415", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415" }, { "name": "25159", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25159" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-032.html" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25255" }, { "name": "24196", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24196" }, { "name": "RHSA-2007:0354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "24195", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24195" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-029.html" }, { "name": "26235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "20070515 ZDI-07-032: Samba sec_io_acl Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468672/100/0/threaded" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "20070515 ZDI-07-031: Samba smb_io_notify_option_type_data Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468673/100/0/threaded" }, { "name": "20070515 ZDI-07-029: Samba lsa_io_privilege_set Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468674/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2007-2446.html" }, { "name": "samba-lsaiotransnames-bo(34316)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "ADV-2007-3229", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25257" }, { "name": "25391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25391/" }, { "name": "24198", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24198" }, { "name": "20070515 ZDI-07-030: Samba netdfs_io_dfs_EnumInfo_d Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468675/100/0/threaded" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "APPLE-SA-2007-07-31", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "samba-secioacl-bo(34314)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34314" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-033.html" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "samba-netdfsiodfsenuminfod-bo(34311)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34311" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "samba-smbionotifyoptiontypedata-bo(34312)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34312" }, { "name": "2702", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2702" }, { "name": "25567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25567" }, { "name": "34731", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34731" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-031.html" }, { "name": "34699", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34699" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28292" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25259" }, { "name": "samba-lsaioprivilegeset-bo(34309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34309" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34732", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/34732" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468542/100/0/threaded" }, { "name": "1018050", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018050" }, { "name": "23973", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23973" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-030.html" }, { "name": "26909", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "VU#773720", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/773720" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25246" }, { "name": "20070515 ZDI-07-033: Samba lsa_io_trans_names Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468680/100/0/threaded" }, { "name": "24197", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24197" }, { "name": "34733", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34733" }, { "name": "oval:org.mitre.oval:def:11415", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415" }, { "name": "25159", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25159" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-032.html" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25255" }, { "name": "24196", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24196" }, { "name": "RHSA-2007:0354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "24195", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24195" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-029.html" }, { "name": "26235", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-2446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-200705-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "20070515 ZDI-07-032: Samba sec_io_acl Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468672/100/0/threaded" }, { "name": "25289", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25289" }, { "name": "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html" }, { "name": "20070515 ZDI-07-031: Samba smb_io_notify_option_type_data Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468673/100/0/threaded" }, { "name": "20070515 ZDI-07-029: Samba lsa_io_privilege_set Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468674/100/0/threaded" }, { "name": "http://www.samba.org/samba/security/CVE-2007-2446.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2007-2446.html" }, { "name": "samba-lsaiotransnames-bo(34316)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34316" }, { "name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf" }, { "name": "ADV-2007-2732", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "name": "ADV-2007-1805", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "ADV-2007-3229", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3229" }, { "name": "25772", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25772" }, { "name": "HPSBUX02218", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "OpenPKG-SA-2007.012", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "25257", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25257" }, { "name": "25391", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25391/" }, { "name": "24198", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24198" }, { "name": "20070515 ZDI-07-030: Samba netdfs_io_dfs_EnumInfo_d Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468675/100/0/threaded" }, { "name": "SUSE-SA:2007:031", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "APPLE-SA-2007-07-31", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "name": "samba-secioacl-bo(34314)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34314" }, { "name": "ADV-2007-2281", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-033.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-033.html" }, { "name": "ADV-2007-2210", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "samba-netdfsiodfsenuminfod-bo(34311)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34311" }, { "name": "2007-0017", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "USN-460-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "samba-smbionotifyoptiontypedata-bo(34312)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34312" }, { "name": "2702", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2702" }, { "name": "25567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25567" }, { "name": "34731", "refsource": "OSVDB", "url": "http://osvdb.org/34731" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-031.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-031.html" }, { "name": "34699", "refsource": "OSVDB", "url": "http://osvdb.org/34699" }, { "name": "25241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25241" }, { "name": "28292", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28292" }, { "name": "MDKSA-2007:104", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25256" }, { "name": "https://issues.rpath.com/browse/RPL-1366", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25259" }, { "name": "samba-lsaioprivilegeset-bo(34309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34309" }, { "name": "SSA:2007-134-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "34732", "refsource": "OSVDB", "url": "http://www.osvdb.org/34732" }, { "name": "102964", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468542/100/0/threaded" }, { "name": "1018050", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018050" }, { "name": "23973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23973" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-030.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-030.html" }, { "name": "26909", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26909" }, { "name": "SSRT071424", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768" }, { "name": "ADV-2008-0050", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0050" }, { "name": "27706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27706" }, { "name": "DSA-1291", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "VU#773720", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/773720" }, { "name": "http://docs.info.apple.com/article.html?artnum=306172", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "name": "25232", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "25246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25246" }, { "name": "20070515 ZDI-07-033: Samba lsa_io_trans_names Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468680/100/0/threaded" }, { "name": "24197", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24197" }, { "name": "34733", "refsource": "OSVDB", "url": "http://osvdb.org/34733" }, { "name": "oval:org.mitre.oval:def:11415", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11415" }, { "name": "25159", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25159" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-032.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-032.html" }, { "name": "25255", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25255" }, { "name": "24196", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24196" }, { "name": "RHSA-2007:0354", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html" }, { "name": "24195", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24195" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-029.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-029.html" }, { "name": "26235", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26235" }, { "name": "25675", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25675" }, { "name": "ADV-2007-2079", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-2446", "datePublished": "2007-05-14T21:00:00", "dateReserved": "2007-05-02T00:00:00", "dateUpdated": "2024-08-07T13:42:33.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0600
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.770Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "samba-swat-base64-bo(16785)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16785" }, { "name": "CLA-2004:851", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11445" }, { "name": "SUSE-SA:2004:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "20040722 SWAT PreAuthorization PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109053195818351\u0026w=2" }, { "name": "MDKSA-2004:071", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "GLSA-200407-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "20040722 Samba 3.x swat preauthentication buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052647928375\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "samba-swat-base64-bo(16785)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16785" }, { "name": "CLA-2004:851", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11445", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11445" }, { "name": "SUSE-SA:2004:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "20040722 SWAT PreAuthorization PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109053195818351\u0026w=2" }, { "name": "MDKSA-2004:071", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "GLSA-200407-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "20040722 Samba 3.x swat preauthentication buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052647928375\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2004-0039", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "samba-swat-base64-bo(16785)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16785" }, { "name": "CLA-2004:851", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11445", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11445" }, { "name": "SUSE-SA:2004:022", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "20040722 SWAT PreAuthorization PoC", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109053195818351\u0026w=2" }, { "name": "MDKSA-2004:071", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "GLSA-200407-21", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "20040722 Samba 3.x swat preauthentication buffer overflow", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109052647928375\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0600", "datePublished": "2004-07-23T04:00:00", "dateReserved": "2004-06-23T00:00:00", "dateUpdated": "2024-08-08T00:24:26.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42898
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://web.mit.edu/kerberos/advisories/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-42898.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583" }, { "tags": [ "x_transferred" ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c" }, { "tags": [ "x_transferred" ], "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt" }, { "tags": [ "x_transferred" ], "url": "https://web.mit.edu/kerberos/krb5-1.19/" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230223-0001/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-08T08:06:38.475643", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://web.mit.edu/kerberos/advisories/" }, { "url": "https://www.samba.org/samba/security/CVE-2022-42898.html" }, { "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583" }, { "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c" }, { "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt" }, { "url": "https://web.mit.edu/kerberos/krb5-1.19/" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203" }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "url": "https://security.netapp.com/advisory/ntap-20230223-0001/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-06" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-42898", "datePublished": "2022-12-25T00:00:00", "dateReserved": "2022-10-13T00:00:00", "dateUpdated": "2024-08-03T13:19:05.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1139
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2613 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3738-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2018:2612 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105084 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:3056 | vendor-advisory, x_refsource_REDHAT | |
https://security.netapp.com/advisory/ntap-20180814-0001/ | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2018-1139.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
▼ | Vendor | Product |
---|---|---|
The Samba Team | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139" }, { "name": "105084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105084" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-1139.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Team", "versions": [ { "status": "affected", "version": "before 4.7.9" }, { "status": "affected", "version": "before 4.8.4" } ] } ], "datePublic": "2018-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:11", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:2613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139" }, { "name": "105084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105084" }, { "name": "RHSA-2018:3056", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-1139.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "before 4.7.9" }, { "version_value": "before 4.8.4" } ] } } ] }, "vendor_name": "The Samba Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2613", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2613" }, { "name": "USN-3738-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "RHSA-2018:2612", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2612" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139" }, { "name": "105084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105084" }, { "name": "RHSA-2018:3056", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3056" }, { "name": "https://security.netapp.com/advisory/ntap-20180814-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "https://www.samba.org/samba/security/CVE-2018-1139.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-1139.html" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1139", "datePublished": "2018-08-22T14:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0213
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-0213" }, { "name": "SUSE-SU-2013:0326", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "openSUSE-SU-2013:0281", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "name": "SUSE-SU-2013:0519", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-0213" }, { "name": "SUSE-SU-2013:0326", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "openSUSE-SU-2013:0281", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "name": "SUSE-SU-2013:0519", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.samba.org/samba/security/CVE-2013-0213", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-0213" }, { "name": "SUSE-SU-2013:0326", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "openSUSE-SU-2013:0281", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "name": "SUSE-SU-2013:0519", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0213", "datePublished": "2013-02-02T20:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4475
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "name": "56508", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56508" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "63646", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/63646" }, { "name": "DSA-2812", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2812" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.6.20.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2013:1787", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-4475" }, { "name": "RHSA-2013:1806", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control" }, { "name": "openSUSE-SU-2013:1790", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" }, { "name": "RHSA-2014:0009", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "name": "56508", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56508" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "63646", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/63646" }, { "name": "DSA-2812", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2812" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.6.20.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2013:1787", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-4475" }, { "name": "RHSA-2013:1806", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control" }, { "name": "openSUSE-SU-2013:1790", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" }, { "name": "RHSA-2014:0009", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2054-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "FEDORA-2014-9132", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "http://www.samba.org/samba/history/samba-4.1.1.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-4.1.1.html" }, { "name": "56508", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56508" }, { "name": "http://www.samba.org/samba/history/samba-4.0.11.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-4.0.11.html" }, { "name": "63646", "refsource": "BID", "url": "http://www.securityfocus.com/bid/63646" }, { "name": "DSA-2812", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2812" }, { "name": "SUSE-SU-2014:0024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "name": "http://www.samba.org/samba/history/samba-3.6.20.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-3.6.20.html" }, { "name": "GLSA-201502-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "openSUSE-SU-2013:1742", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" }, { "name": "openSUSE-SU-2013:1921", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2013:1787", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "http://www.samba.org/samba/security/CVE-2013-4475", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-4475" }, { "name": "RHSA-2013:1806", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control" }, { "name": "openSUSE-SU-2013:1790", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" }, { "name": "RHSA-2014:0009", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4475", "datePublished": "2013-11-13T15:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16851
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106027 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3827-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3827-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16851 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4345 | vendor-advisory, x_refsource_DEBIAN | |
https://www.samba.org/samba/security/CVE-2018-16851.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:53.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106027", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106027" }, { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16851" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16851.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.7.12" }, { "status": "affected", "version": "4.8.7" }, { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba\u0027s AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:18", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "106027", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106027" }, { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16851" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-16851.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.7.12" }, { "version_value": "4.8.7" }, { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba\u0027s AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "106027", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106027" }, { "name": "USN-3827-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16851", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16851" }, { "name": "DSA-4345", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4345" }, { "name": "https://www.samba.org/samba/security/CVE-2018-16851.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-16851.html" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16851", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:53.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44640
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-08T08:06:33.314988", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4" }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "name": "GLSA-202310-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-06" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-44640", "datePublished": "2022-12-25T00:00:00", "dateReserved": "2022-11-03T00:00:00", "dateUpdated": "2024-08-03T13:54:03.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10704
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:06:11.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2020-e244c98af5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/" }, { "name": "FEDORA-2020-9cf0b1c8f1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-10704.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "All versions before 4.10.15" }, { "status": "affected", "version": "All versions before 4.11.8" }, { "status": "affected", "version": "All versions before 4.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-674", "description": "CWE-674", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2020-e244c98af5", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/" }, { "name": "FEDORA-2020-9cf0b1c8f1", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704" }, { "url": "https://www.samba.org/samba/security/CVE-2020-10704.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10704", "datePublished": "2020-05-06T00:00:00", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:06:11.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3880
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
The Samba Project | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-3880.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "name": "openSUSE-SU-2019:1180", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190411-0004/" }, { "name": "FEDORA-2019-cacf88eabf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "name": "FEDORA-2019-db21b5f1d2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "name": "openSUSE-SU-2019:1292", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" }, { "name": "FEDORA-2019-019c5314a0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K20804356" }, { "name": "RHSA-2019:1966", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1966" }, { "name": "RHSA-2019:1967", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1967" }, { "name": "RHSA-2019:2099", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2099" }, { "name": "RHSA-2019:3582", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3582" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Project", "versions": [ { "status": "affected", "version": "4.8.11" }, { "status": "affected", "version": "4.9.6" }, { "status": "affected", "version": "4.10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:07:56", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2019-3880.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "name": "openSUSE-SU-2019:1180", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190411-0004/" }, { "name": "FEDORA-2019-cacf88eabf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "name": "FEDORA-2019-db21b5f1d2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "name": "openSUSE-SU-2019:1292", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" }, { "name": "FEDORA-2019-019c5314a0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K20804356" }, { "name": "RHSA-2019:1966", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1966" }, { "name": "RHSA-2019:1967", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1967" }, { "name": "RHSA-2019:2099", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2099" }, { "name": "RHSA-2019:3582", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3582" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.8.11" }, { "version_value": "4.9.6" }, { "version_value": "4.10.2" } ] } } ] }, "vendor_name": "The Samba Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2019-3880.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2019-3880.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" }, { "name": "openSUSE-SU-2019:1180", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190411-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190411-0004/" }, { "name": "FEDORA-2019-cacf88eabf", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "name": "FEDORA-2019-db21b5f1d2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "name": "openSUSE-SU-2019:1292", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" }, { "name": "FEDORA-2019-019c5314a0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/" }, { "name": "https://support.f5.com/csp/article/K20804356", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K20804356" }, { "name": "RHSA-2019:1966", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1966" }, { "name": "RHSA-2019:1967", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1967" }, { "name": "RHSA-2019:2099", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2099" }, { "name": "RHSA-2019:3582", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3582" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3880", "datePublished": "2019-04-09T15:18:08", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0214
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2013:0326", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "89627", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/89627" }, { "name": "openSUSE-SU-2013:0281", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-0214" }, { "name": "SUSE-SU-2013:0519", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SU-2013:0326", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "89627", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/89627" }, { "name": "openSUSE-SU-2013:0281", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-0214" }, { "name": "SUSE-SU-2013:0519", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0214", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2013:0326", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" }, { "name": "89627", "refsource": "OSVDB", "url": "http://osvdb.org/89627" }, { "name": "openSUSE-SU-2013:0281", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" }, { "name": "57631", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57631" }, { "name": "openSUSE-SU-2013:0277", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" }, { "name": "http://www.samba.org/samba/security/CVE-2013-0214", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-0214" }, { "name": "SUSE-SU-2013:0519", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "RHSA-2014:0305", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "USN-2922-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2922-1" }, { "name": "DSA-2617", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2617" }, { "name": "RHSA-2013:1310", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "RHSA-2013:1542", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0214", "datePublished": "2013-02-02T20:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15275
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:3278", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "USN-3486-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3486-2" }, { "name": "DSA-4043", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "[debian-lts-announce] 20171121 [SECURITY] [DLA 1183-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html" }, { "name": "RHSA-2017:3260", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-15275.html" }, { "name": "RHSA-2017:3261", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "name": "1039855", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039855" }, { "name": "101908", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101908" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2017:3278", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "USN-3486-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3486-2" }, { "name": "DSA-4043", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "[debian-lts-announce] 20171121 [SECURITY] [DLA 1183-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html" }, { "name": "RHSA-2017:3260", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-15275.html" }, { "name": "RHSA-2017:3261", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "name": "1039855", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039855" }, { "name": "101908", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101908" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:3278", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3278" }, { "name": "USN-3486-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3486-2" }, { "name": "DSA-4043", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4043" }, { "name": "[debian-lts-announce] 20171121 [SECURITY] [DLA 1183-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html" }, { "name": "RHSA-2017:3260", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3260" }, { "name": "https://www.samba.org/samba/security/CVE-2017-15275.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-15275.html" }, { "name": "RHSA-2017:3261", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3261" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "GLSA-201805-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "USN-3486-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3486-1" }, { "name": "1039855", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039855" }, { "name": "101908", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101908" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_72_Samba", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15275", "datePublished": "2017-11-27T22:00:00", "dateReserved": "2017-10-11T00:00:00", "dateUpdated": "2024-08-05T19:50:16.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32743
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:44.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14833" }, { "tags": [ "x_transferred" ], "url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d619-408d-ba17-380714b89fd1" }, { "name": "FEDORA-2022-4555909843", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.1 and newer" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:33.632859", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14833" }, { "url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d619-408d-ba17-380714b89fd1" }, { "name": "FEDORA-2022-4555909843", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-32743", "datePublished": "2022-09-01T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:44.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12436
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2019-12436.html | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4018-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/108823 | vdb-entry, x_refsource_BID | |
https://www.synology.com/security/advisory/Synology_SA_19_27 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:40.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-12436.html" }, { "name": "USN-4018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-06T05:06:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2019-12436.html" }, { "name": "USN-4018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2019-12436.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2019-12436.html" }, { "name": "USN-4018-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4018-1/" }, { "name": "108823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108823" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_27", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_27" }, { "name": "FEDORA-2019-8015e5dc40", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ3LCJNJ3ONHIRKDSKOTT6QGXALLCHVG/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12436", "datePublished": "2019-06-19T12:00:33", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:40.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0938
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5442 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:31.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0938", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:31.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2124
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2124.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.15.2, samba 4.14.10, samba 4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:48.847743", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660" }, { "url": "https://www.samba.org/samba/security/CVE-2016-2124.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2124", "datePublished": "2022-02-18T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43566
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.samba.org/show_bug.cgi?id=13979 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220110-0001/ | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2021-43566.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220110-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-43566.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-01T14:25:24", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220110-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2021-43566.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.samba.org/show_bug.cgi?id=13979", "refsource": "MISC", "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979" }, { "name": "https://security.netapp.com/advisory/ntap-20220110-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220110-0001/" }, { "name": "https://www.samba.org/samba/security/CVE-2021-43566.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2021-43566.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43566", "datePublished": "2022-01-11T15:15:01", "dateReserved": "2021-11-09T00:00:00", "dateUpdated": "2024-08-04T04:03:08.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2813
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:36.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSRT090212", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "oval:org.mitre.oval:def:9191", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191" }, { "name": "HPSBUX02479", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "1021111", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "37428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37428" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2009-2813.html" }, { "name": "oval:org.mitre.oval:def:7257", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3865" }, { "name": "36363", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36363" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36918" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36701" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36893" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "oval:org.mitre.oval:def:7211", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "macosx-smb-security-bypass(53174)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174" }, { "name": "oval:org.mitre.oval:def:7791", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791" }, { "name": "57955", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/57955" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSRT090212", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "oval:org.mitre.oval:def:9191", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191" }, { "name": "HPSBUX02479", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "1021111", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "37428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37428" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2009-2813.html" }, { "name": "oval:org.mitre.oval:def:7257", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3865" }, { "name": "36363", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36363" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36918" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36701" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36893" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "oval:org.mitre.oval:def:7211", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "macosx-smb-security-bypass(53174)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174" }, { "name": "oval:org.mitre.oval:def:7791", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791" }, { "name": "57955", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/57955" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSRT090212", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "name": "http://news.samba.org/releases/3.4.2/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "FEDORA-2009-10172", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "oval:org.mitre.oval:def:9191", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191" }, { "name": "HPSBUX02479", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "name": "http://news.samba.org/releases/3.2.15/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "APPLE-SA-2009-09-10-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "1021111", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "name": "ADV-2009-2810", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "37428", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37428" }, { "name": "36937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "http://news.samba.org/releases/3.0.37/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "http://www.samba.org/samba/security/CVE-2009-2813.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2009-2813.html" }, { "name": "oval:org.mitre.oval:def:7257", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257" }, { "name": "http://support.apple.com/kb/HT3865", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3865" }, { "name": "36363", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36363" }, { "name": "36918", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36918" }, { "name": "36701", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36701" }, { "name": "36893", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36893" }, { "name": "http://news.samba.org/releases/3.3.8/", "refsource": "CONFIRM", "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36953" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0145", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "oval:org.mitre.oval:def:7211", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211" }, { "name": "SUSE-SR:2009:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "macosx-smb-security-bypass(53174)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174" }, { "name": "oval:org.mitre.oval:def:7791", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791" }, { "name": "57955", "refsource": "OSVDB", "url": "http://osvdb.org/57955" }, { "name": "FEDORA-2009-10180", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2813", "datePublished": "2009-09-14T16:00:00", "dateReserved": "2009-08-17T00:00:00", "dateUpdated": "2024-08-07T06:07:36.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6442
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.samba.org/samba/history/samba-4.1.6.html | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html | vendor-advisory, x_refsource_FEDORA | |
http://www.samba.org/samba/security/CVE-2013-6442 | x_refsource_CONFIRM | |
http://www.samba.org/samba/history/samba-4.0.16.html | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.samba.org/show_bug.cgi?id=10327 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/66232 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.1.6.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-6442" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.0.16.html" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2014:0404", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10327" }, { "name": "66232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66232" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.1.6.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-6442" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.0.16.html" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2014:0404", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10327" }, { "name": "66232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66232" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6442", "datePublished": "2014-03-14T10:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2112.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"client ldap sasl wrapping\" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2112.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"client ldap sasl wrapping\" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2112.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2112.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2112", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45141
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2022-45141.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.405Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-45141.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in samba 4.15.13, samba 4.16.8, samba 4.15.13" } ] } ], "descriptions": [ { "lang": "en", "value": "Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-328", "description": "CWE-328", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:25.974088", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-45141.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-45141", "datePublished": "2023-03-06T00:00:00", "dateReserved": "2022-11-10T00:00:00", "dateUpdated": "2024-08-03T14:09:56.405Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0452
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24046" }, { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24101" }, { "name": "24076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24076" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "SSRT071341", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462" }, { "name": "GLSA-200702-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml" }, { "name": "2219", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2219" }, { "name": "ADV-2007-1278", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1278" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "name": "24030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24030" }, { "name": "24140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0452.html" }, { "name": "24021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24021" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24284" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0452: Potential DoS against smbd in Samba 3.0.6 - 3.0.23d", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459167/100/0/threaded" }, { "name": "22395", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22395" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "name": "1017587", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017587" }, { "name": "24067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24067" }, { "name": "24145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24145" }, { "name": "24060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24060" }, { "name": "RHSA-2007:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0060.html" }, { "name": "33100", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33100" }, { "name": "HPSBUX02204", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462" }, { "name": "MDKSA-2007:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "USN-419-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-419-1" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "FEDORA-2007-219", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2579" }, { "name": "RHSA-2007:0061", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0061.html" }, { "name": "FEDORA-2007-220", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/cms/node/2580" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "24792", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24792" }, { "name": "samba-smbd-filerename-dos(32301)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32301" }, { "name": "DSA-1257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1257" }, { "name": "24188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24188" }, { "name": "oval:org.mitre.oval:def:9758", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758" }, { "name": "SUSE-SA:2007:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "24046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24046" }, { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24101" }, { "name": "24076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24076" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "SSRT071341", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462" }, { "name": "GLSA-200702-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml" }, { "name": "2219", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2219" }, { "name": "ADV-2007-1278", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1278" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "name": "24030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24030" }, { "name": "24140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0452.html" }, { "name": "24021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24021" }, { "name": "24284", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24284" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0452: Potential DoS against smbd in Samba 3.0.6 - 3.0.23d", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459167/100/0/threaded" }, { "name": "22395", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22395" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "name": "1017587", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017587" }, { "name": "24067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24067" }, { "name": "24145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24145" }, { "name": "24060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24060" }, { "name": "RHSA-2007:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0060.html" }, { "name": "33100", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33100" }, { "name": "HPSBUX02204", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462" }, { "name": "MDKSA-2007:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "USN-419-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-419-1" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "FEDORA-2007-219", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2579" }, { "name": "RHSA-2007:0061", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0061.html" }, { "name": "FEDORA-2007-220", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/cms/node/2580" }, { "name": "20070201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "24792", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24792" }, { "name": "samba-smbd-filerename-dos(32301)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32301" }, { "name": "DSA-1257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1257" }, { "name": "24188", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24188" }, { "name": "oval:org.mitre.oval:def:9758", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758" }, { "name": "SUSE-SA:2007:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-0452", "datePublished": "2007-02-06T02:00:00", "dateReserved": "2007-01-23T00:00:00", "dateUpdated": "2024-08-07T12:19:30.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0936
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5445 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/1874 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:31.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logfile-info(5445)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5445" }, { "name": "1874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1874" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logfile-info(5445)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5445" }, { "name": "1874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1874" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logfile-info(5445)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5445" }, { "name": "1874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1874" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0936", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:31.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2022-2031.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:44.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-2031.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to samba 4.16.4, samba 4.15.9, samba 4.14.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other\u0027s tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:21.529909", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-2031.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-2031", "datePublished": "2022-08-25T00:00:00", "dateReserved": "2022-06-08T00:00:00", "dateUpdated": "2024-08-03T00:24:44.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "openSUSE-SU-2016:1440", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2110.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "openSUSE-SU-2016:1440", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2110.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "openSUSE-SU-2016:1440", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "RHSA-2016:0621", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "SUSE-SU-2016:1105", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2110.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2110.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "RHSA-2016:0623", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "RHSA-2016:0625", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2110", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32744
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2022-32744.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:44.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-32744.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to samba 4.16.4, samba 4.15.9, samba 4.14.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users\u0027 passwords, enabling full domain takeover." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:45.869679", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-32744.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-32744", "datePublished": "2022-08-25T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:44.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1888
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-1664", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1664" }, { "name": "DSA-1823", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2009-1888.html" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "samba-acl-security-bypass(51327)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51327" }, { "name": "35573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35573" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch" }, { "name": "35606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35606" }, { "name": "SSA:2009-177-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591" }, { "name": "35472", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35472" }, { "name": "oval:org.mitre.oval:def:7292", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "oval:org.mitre.oval:def:10790", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790" }, { "name": "35539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35539" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36918" }, { "name": "MDVSA-2009:196", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "1022442", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2009-1664", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1664" }, { "name": "DSA-1823", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2009-1888.html" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "samba-acl-security-bypass(51327)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51327" }, { "name": "35573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35573" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch" }, { "name": "35606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35606" }, { "name": "SSA:2009-177-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591" }, { "name": "35472", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35472" }, { "name": "oval:org.mitre.oval:def:7292", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "oval:org.mitre.oval:def:10790", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790" }, { "name": "35539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35539" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36918" }, { "name": "MDVSA-2009:196", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "1022442", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022442" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-1888", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-02T00:00:00", "dateUpdated": "2024-08-07T05:27:54.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4091
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6209 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:6744 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7371 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7408 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7464 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7467 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-4091 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241882 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15439 | ||
https://www.samba.org/samba/security/CVE-2023-4091.html |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-4091", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-25T16:18:12.014053Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:27:11.711Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:11.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-4091" }, { "name": "RHBZ#2241882", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-4091.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-2.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.8::baseos", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-4.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-101.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::resilientstorage", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-111.el9_0", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::resilientstorage", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-104.el9_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::crb" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-13.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-10-10T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module \"acl_xattr\" is configured with \"acl_xattr:ignore system acls = yes\". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba\u0027s permissions." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:31:44.905Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6209" }, { "name": "RHSA-2023:6744", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6744" }, { "name": "RHSA-2023:7371", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7371" }, { "name": "RHSA-2023:7408", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7408" }, { "name": "RHSA-2023:7464", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7464" }, { "name": "RHSA-2023:7467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7467" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-4091" }, { "name": "RHBZ#2241882", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439" }, { "url": "https://www.samba.org/samba/security/CVE-2023-4091.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-10T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: smb clients can truncate files with read-only permissions", "workarounds": [ { "lang": "en", "value": "The vulnerability is most commonly associated with the \"acl_xattr\" module and can be mitigated by setting:\n~~~\n\"acl_xattr:ignore system acls = no\"\n~~~" } ], "x_redhatCweChain": "CWE-276: Incorrect Default Permissions" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-4091", "datePublished": "2023-11-03T07:56:35.611Z", "dateReserved": "2023-08-02T09:43:21.439Z", "dateUpdated": "2024-09-16T14:31:44.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25721
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-25721.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14725" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affected - All versions since Samba 4.0.0, Fixed-In - v4.15.2, v4.14.10 and v4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 (Improper Input validation)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:24.438554", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2020-25721.html" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14725" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25721", "datePublished": "2022-03-16T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0935
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5443 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/1872 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logging-sym-link(5443)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443" }, { "name": "1872", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1872" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows local users to overwrite arbitrary files via a symlink attack on the cgi.log file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logging-sym-link(5443)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443" }, { "name": "1872", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1872" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows local users to overwrite arbitrary files via a symlink attack on the cgi.log file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-logging-sym-link(5443)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5443" }, { "name": "1872", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1872" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0935", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:31.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4572
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-544-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-544-2" }, { "name": "27691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27691" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "USN-544-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/544-1/" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29341" }, { "name": "1018954", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018954" }, { "name": "SSA:2007-320-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28136" }, { "name": "30736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30736" }, { "name": "ADV-2007-3869", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3869" }, { "name": "27679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27679" }, { "name": "27682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27682" }, { "name": "27701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27701" }, { "name": "RHSA-2007:1013", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "samba-nmbd-bo(38501)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38501" }, { "name": "27720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27720" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30484" }, { "name": "20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded" }, { "name": "DSA-1409", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1409" }, { "name": "27450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27450" }, { "name": "27731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27731" }, { "name": "[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html" }, { "name": "oval:org.mitre.oval:def:11132", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "MDKSA-2007:224", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224" }, { "name": "27787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "oval:org.mitre.oval:def:5643", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643" }, { "name": "28368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28368" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1894" }, { "name": "26454", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26454" }, { "name": "GLSA-200711-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml" }, { "name": "USN-617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-617-1" }, { "name": "FEDORA-2007-3402", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html" }, { "name": "27927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27927" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "237764", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2007-4572.html" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" }, { "name": "ADV-2008-0064", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0064" }, { "name": "SUSE-SA:2007:065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html" }, { "name": "20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-544-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-544-2" }, { "name": "27691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27691" }, { "name": "RHSA-2007:1016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html" }, { "name": "USN-544-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/544-1/" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "30835", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30835" }, { "name": "29341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29341" }, { "name": "1018954", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018954" }, { "name": "SSA:2007-320-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739" }, { "name": "HPSBUX02316", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28136" }, { "name": "30736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30736" }, { "name": "ADV-2007-3869", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3869" }, { "name": "27679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27679" }, { "name": "27682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27682" }, { "name": "27701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27701" }, { "name": "RHSA-2007:1013", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html" }, { "name": "ADV-2008-1908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1908" }, { "name": "samba-nmbd-bo(38501)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38501" }, { "name": "27720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27720" }, { "name": "SSRT071495", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2" }, { "name": "HPSBUX02341", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "30484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30484" }, { "name": "20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded" }, { "name": "DSA-1409", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1409" }, { "name": "27450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27450" }, { "name": "27731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27731" }, { "name": "[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html" }, { "name": "oval:org.mitre.oval:def:11132", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132" }, { "name": "SSRT080075", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "MDKSA-2007:224", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224" }, { "name": "27787", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "oval:org.mitre.oval:def:5643", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643" }, { "name": "28368", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28368" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1894" }, { "name": "26454", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26454" }, { "name": "GLSA-200711-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml" }, { "name": "USN-617-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-617-1" }, { "name": "FEDORA-2007-3402", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html" }, { "name": "27927", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27927" }, { "name": "ADV-2008-1712", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1712/references" }, { "name": "ADV-2008-0859", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0859/references" }, { "name": "237764", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2007-4572.html" }, { "name": "RHSA-2007:1017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html" }, { "name": "ADV-2008-0064", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0064" }, { "name": "SUSE-SA:2007:065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html" }, { "name": "20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4572", "datePublished": "2007-11-16T18:00:00", "dateReserved": "2007-08-28T00:00:00", "dateUpdated": "2024-08-07T15:01:09.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6150
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "[samba-technical] 20120612 winbind pam security problem", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.samba.org/archive/samba-technical/2012-June/084593.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "[samba-technical] 20131128 fail authentication if user isn\u0027t member of *any* require_membership_of specified groups", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.samba.org/archive/samba-technical/2013-November/096411.html" }, { "name": "[oss-security] 20131202 Re: CVE request: samba pam_winbind authentication fails open", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2013/12/03/5" }, { "name": "RHSA-2014:0330", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10300" }, { "name": "MDVSA-2013:299", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036897" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator\u0027s pam_winbind configuration-file mistake." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-05T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "USN-2054-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2054-1" }, { "name": "[samba-technical] 20120612 winbind pam security problem", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.samba.org/archive/samba-technical/2012-June/084593.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "SUSE-SU-2014:0024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" }, { "name": "openSUSE-SU-2014:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "FEDORA-2014-7672", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html" }, { "name": "openSUSE-SU-2013:1921", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "[samba-technical] 20131128 fail authentication if user isn\u0027t member of *any* require_membership_of specified groups", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.samba.org/archive/samba-technical/2013-November/096411.html" }, { "name": "[oss-security] 20131202 Re: CVE request: samba pam_winbind authentication fails open", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2013/12/03/5" }, { "name": "RHSA-2014:0330", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=10300" }, { "name": "MDVSA-2013:299", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036897" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-6150", "datePublished": "2013-12-03T19:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10700
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700 | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2020-10700.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/202007-15 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:06:11.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-10700.html" }, { "name": "FEDORA-2020-c931060ab7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/" }, { "name": "FEDORA-2020-e244c98af5", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/" }, { "name": "FEDORA-2020-9cf0b1c8f1", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "All versions before 4.10.15" }, { "status": "affected", "version": "All versions before 4.11.8" }, { "status": "affected", "version": "All versions before 4.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A use-after-free flaw was found in the way samba AD DC LDAP servers, handled \u0027Paged Results\u0027 control is combined with the \u0027ASQ\u0027 control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-01T17:06:40", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-10700.html" }, { "name": "FEDORA-2020-c931060ab7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/" }, { "name": "FEDORA-2020-e244c98af5", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/" }, { "name": "FEDORA-2020-9cf0b1c8f1", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10700", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "All versions before 4.10.15" }, { "version_value": "All versions before 4.11.8" }, { "version_value": "All versions before 4.12.2" } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free flaw was found in the way samba AD DC LDAP servers, handled \u0027Paged Results\u0027 control is combined with the \u0027ASQ\u0027 control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10700" }, { "name": "https://www.samba.org/samba/security/CVE-2020-10700.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-10700.html" }, { "name": "FEDORA-2020-c931060ab7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WG54NRMES2GTURZKZH6H4BGXCD3OMJDJ/" }, { "name": "FEDORA-2020-e244c98af5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/" }, { "name": "FEDORA-2020-9cf0b1c8f1", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/" }, { "name": "openSUSE-SU-2020:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10700", "datePublished": "2020-05-04T20:03:50", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:06:11.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38023
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:37:42.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Netlogon RPC Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4645:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4645", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4645:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.4645", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1850:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.20348.1850", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6085:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.6085", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6085:*:*:*:*:*:*:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.6085", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22175:*:*:*:*:*:x64:*" ], "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22175", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22175:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22175:*:*:*:*:*:x86:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22175", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22175:*:*:*:*:*:x86:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22175", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26623:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26623", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26623:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.26623", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24374:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24374", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24374:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24374", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21063:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21075:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.21063", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.9600.21075", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21063:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21075:*:*:*:*:*:x64:*" ], "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.21063", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.9600.21075", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-08T08:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Netlogon RPC Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T14:01:33.956Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Netlogon RPC Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" }, { "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "Netlogon RPC Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2022-38023", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-08-08T00:00:00", "dateUpdated": "2024-08-03T10:37:42.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0547
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2010/1062 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/39317 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201206-29.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/38326 | vdb-entry, x_refsource_BID | |
http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a065c177dfc8f968775593ba00dffafeebb2e054 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:090 | vendor-advisory, x_refsource_MANDRIVA | |
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:19.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1062", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "39317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39317" }, { "name": "GLSA-201206-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "38326", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a065c177dfc8f968775593ba00dffafeebb2e054" }, { "name": "MDVSA-2010:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "name": "SUSE-SR:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-03-26T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-1062", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "39317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39317" }, { "name": "GLSA-201206-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "38326", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a065c177dfc8f968775593ba00dffafeebb2e054" }, { "name": "MDVSA-2010:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "name": "SUSE-SR:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0547", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1062", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "39317", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39317" }, { "name": "GLSA-201206-29", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "38326", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38326" }, { "name": "http://git.samba.org/?p=samba.git;a=commit;h=a065c177dfc8f968775593ba00dffafeebb2e054", "refsource": "CONFIRM", "url": "http://git.samba.org/?p=samba.git;a=commit;h=a065c177dfc8f968775593ba00dffafeebb2e054" }, { "name": "MDVSA-2010:090", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "name": "SUSE-SR:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" }, { "name": "SUSE-SR:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0547", "datePublished": "2010-02-04T18:00:00", "dateReserved": "2010-02-04T00:00:00", "dateUpdated": "2024-08-07T00:52:19.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14629
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3827-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3827-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/106022 | vdb-entry, x_refsource_BID | |
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4345 | vendor-advisory, x_refsource_DEBIAN | |
https://www.samba.org/samba/security/CVE-2018-14629.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "name": "106022", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106022" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-14629.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.7.12" }, { "status": "affected", "version": "4.8.7" }, { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability was discovered in Samba\u0027s LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:04", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "name": "106022", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106022" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-14629.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.7.12" }, { "version_value": "4.8.7" }, { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service vulnerability was discovered in Samba\u0027s LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3827-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-1/" }, { "name": "106022", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106022" }, { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "[debian-lts-announce] 20181215 [SECURITY] [DLA 1607-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629" }, { "name": "DSA-4345", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4345" }, { "name": "https://www.samba.org/samba/security/CVE-2018-14629.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-14629.html" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14629", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:29:51.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3670
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:08.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects Samba 4.1 and newer." } ] } ], "descriptions": [ { "lang": "en", "value": "MaxQueryDuration not honoured in Samba AD DC LDAP" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 - Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-23T15:50:25", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393" }, { "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-3670", "datePublished": "2022-08-23T15:50:25", "dateReserved": "2021-07-30T00:00:00", "dateUpdated": "2024-08-03T17:01:08.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0882
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1012235", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012235" }, { "name": "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110055646329581\u0026w=2" }, { "name": "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "samba-qfilepathinfo-bo(18070)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070" }, { "name": "VU#457622", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/457622" }, { "name": "CLA-2004:899", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "13189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13189" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.e-matters.de/advisories/132004.html" }, { "name": "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110054671403755\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9969", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "2004-0058", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.net/errata/2004/0058/" }, { "name": "11782", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/11782" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "P-038", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-038.shtml" }, { "name": "SUSE-SA:2004:040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1012235", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012235" }, { "name": "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110055646329581\u0026w=2" }, { "name": "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "samba-qfilepathinfo-bo(18070)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070" }, { "name": "VU#457622", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/457622" }, { "name": "CLA-2004:899", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "13189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13189" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.e-matters.de/advisories/132004.html" }, { "name": "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110054671403755\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9969", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "2004-0058", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.net/errata/2004/0058/" }, { "name": "11782", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/11782" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "P-038", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-038.shtml" }, { "name": "SUSE-SA:2004:040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1012235", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012235" }, { "name": "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110055646329581\u0026w=2" }, { "name": "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "samba-qfilepathinfo-bo(18070)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070" }, { "name": "VU#457622", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/457622" }, { "name": "CLA-2004:899", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "13189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13189" }, { "name": "http://security.e-matters.de/advisories/132004.html", "refsource": "MISC", "url": "http://security.e-matters.de/advisories/132004.html" }, { "name": "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110054671403755\u0026w=2" }, { "name": "oval:org.mitre.oval:def:9969", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969" }, { "name": "APPLE-SA-2005-03-21", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "2004-0058", "refsource": "TRUSTIX", "url": "http://www.trustix.net/errata/2004/0058/" }, { "name": "11782", "refsource": "OSVDB", "url": "http://www.osvdb.org/11782" }, { "name": "20041201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "P-038", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-038.shtml" }, { "name": "SUSE-SA:2004:040", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "SCOSA-2005.17", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0882", "datePublished": "2004-11-19T05:00:00", "dateReserved": "2004-09-22T00:00:00", "dateUpdated": "2024-08-08T00:31:47.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3560
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:16.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2014-3560" }, { "name": "FEDORA-2014-9141", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605" }, { "name": "1030663", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030663" }, { "name": "59583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59583" }, { "name": "69021", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69021" }, { "name": "USN-2305-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2305-1" }, { "name": "openSUSE-SU-2014:1040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2" }, { "name": "59610", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59610" }, { "name": "samba-cve20143560-bo(95081)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95081" }, { "name": "59976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59976" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2014-3560" }, { "name": "FEDORA-2014-9141", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605" }, { "name": "1030663", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030663" }, { "name": "59583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59583" }, { "name": "69021", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69021" }, { "name": "USN-2305-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2305-1" }, { "name": "openSUSE-SU-2014:1040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2" }, { "name": "59610", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59610" }, { "name": "samba-cve20143560-bo(95081)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95081" }, { "name": "59976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59976" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010" }, { "name": "http://www.samba.org/samba/security/CVE-2014-3560", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2014-3560" }, { "name": "FEDORA-2014-9141", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html" }, { "name": "FEDORA-2014-9132", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commitdiff;h=e6a848630da3ba958c442438ea131c99fa088605", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commitdiff;h=e6a848630da3ba958c442438ea131c99fa088605" }, { "name": "1030663", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030663" }, { "name": "59583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59583" }, { "name": "69021", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69021" }, { "name": "USN-2305-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2305-1" }, { "name": "openSUSE-SU-2014:1040", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commitdiff;h=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commitdiff;h=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2" }, { "name": "59610", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59610" }, { "name": "samba-cve20143560-bo(95081)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95081" }, { "name": "59976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59976" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3560", "datePublished": "2014-08-06T18:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:16.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:1467", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1467" }, { "name": "VU#958321", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/958321" }, { "name": "CLA-2002:550", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000550" }, { "name": "samba-password-change-bo(10683)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10683" }, { "name": "SuSE-SA:2002:045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2002_045_samba.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/whatsnew/samba-2.2.7.html" }, { "name": "20021121 GLSA: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103801986818076\u0026w=2" }, { "name": "DSA-200", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-200" }, { "name": "HPSBUX0212-230", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "20021129 [OpenPKG-SA-2002.012] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103859045302448\u0026w=2" }, { "name": "N-019", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/n-019.shtml" }, { "name": "6210", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6210" }, { "name": "RHSA-2002:266", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-266.html" }, { "name": "53580", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/53580" }, { "name": "20021204-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20021204-01-I" }, { "name": "N-023", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "MDKSA-2002:081", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-081.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-04T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:1467", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1467" }, { "name": "VU#958321", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/958321" }, { "name": "CLA-2002:550", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000550" }, { "name": "samba-password-change-bo(10683)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10683" }, { "name": "SuSE-SA:2002:045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2002_045_samba.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/whatsnew/samba-2.2.7.html" }, { "name": "20021121 GLSA: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103801986818076\u0026w=2" }, { "name": "DSA-200", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-200" }, { "name": "HPSBUX0212-230", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "20021129 [OpenPKG-SA-2002.012] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103859045302448\u0026w=2" }, { "name": "N-019", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/n-019.shtml" }, { "name": "6210", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6210" }, { "name": "RHSA-2002:266", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-266.html" }, { "name": "53580", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/53580" }, { "name": "20021204-01-I", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20021204-01-I" }, { "name": "N-023", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "MDKSA-2002:081", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-081.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:1467", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1467" }, { "name": "VU#958321", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/958321" }, { "name": "CLA-2002:550", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000550" }, { "name": "samba-password-change-bo(10683)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10683" }, { "name": "SuSE-SA:2002:045", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2002_045_samba.html" }, { "name": "http://us1.samba.org/samba/whatsnew/samba-2.2.7.html", "refsource": "CONFIRM", "url": "http://us1.samba.org/samba/whatsnew/samba-2.2.7.html" }, { "name": "20021121 GLSA: samba", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103801986818076\u0026w=2" }, { "name": "DSA-200", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-200" }, { "name": "HPSBUX0212-230", "refsource": "HP", "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "20021129 [OpenPKG-SA-2002.012] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103859045302448\u0026w=2" }, { "name": "N-019", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/n-019.shtml" }, { "name": "6210", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6210" }, { "name": "RHSA-2002:266", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-266.html" }, { "name": "53580", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/53580" }, { "name": "20021204-01-I", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20021204-01-I" }, { "name": "N-023", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/n-023.shtml" }, { "name": "MDKSA-2002:081", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-081.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1318", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-11-25T00:00:00", "dateUpdated": "2024-08-08T03:19:28.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10745
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B | x_refsource_MISC | |
https://www.samba.org/samba/security/CVE-2020-10745.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/202007-15 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:14.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-10745.html" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-23T04:06:23", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-10745.html" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samba", "version": { "version_data": [ { "version_value": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491;", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491;" }, { "name": "https://www.samba.org/samba/security/CVE-2020-10745.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-10745.html" }, { "name": "FEDORA-2020-5131d30947", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10745", "datePublished": "2020-07-07T13:33:08", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:14:14.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1332
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2003-096.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securiteam.com/exploits/5TP0M2AAKS.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/12749 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:02.843Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securiteam.com/exploits/5TP0M2AAKS.html" }, { "name": "samba-reply-nttrans-bo(12749)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12749" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2003:096", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securiteam.com/exploits/5TP0M2AAKS.html" }, { "name": "samba-reply-nttrans-bo(12749)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12749" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:096", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-096.html" }, { "name": "http://www.securiteam.com/exploits/5TP0M2AAKS.html", "refsource": "MISC", "url": "http://www.securiteam.com/exploits/5TP0M2AAKS.html" }, { "name": "samba-reply-nttrans-bo(12749)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12749" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1332", "datePublished": "2007-06-26T00:00:00", "dateReserved": "2007-06-25T00:00:00", "dateUpdated": "2024-08-08T02:28:02.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2016-1494.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/91700 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2016-1486.html | vendor-advisory, x_refsource_REDHAT | |
https://security.gentoo.org/glsa/201805-07 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-1487.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1036244 | vdb-entry, x_refsource_SECTRACK | |
https://www.samba.org/samba/security/CVE-2016-2119.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1494", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html" }, { "name": "91700", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91700" }, { "name": "RHSA-2016:1486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "openSUSE-SU-2016:1830", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" }, { "name": "RHSA-2016:1487", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html" }, { "name": "1036244", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036244" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2119.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1494", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html" }, { "name": "91700", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91700" }, { "name": "RHSA-2016:1486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "openSUSE-SU-2016:1830", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" }, { "name": "RHSA-2016:1487", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html" }, { "name": "1036244", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036244" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2119.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1494", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html" }, { "name": "91700", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91700" }, { "name": "RHSA-2016:1486", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html" }, { "name": "GLSA-201805-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-07" }, { "name": "openSUSE-SU-2016:1830", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" }, { "name": "RHSA-2016:1487", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html" }, { "name": "1036244", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036244" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2119.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2119.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2119", "datePublished": "2016-07-07T15:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19344
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:16:47.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-19344.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "all samba 4.11.x versions before 4.11.5" }, { "status": "affected", "version": "all samba 4.10.x versions before 4.10.12" }, { "status": "affected", "version": "all samba 4.9.x versions before 4.9.18" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:25.208073", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344" }, { "url": "https://www.samba.org/samba/security/CVE-2019-19344.html" }, { "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_20_01" }, { "name": "USN-4244-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4244-1/" }, { "name": "openSUSE-SU-2020:0122", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "name": "FEDORA-2020-6bd386c7eb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/" }, { "name": "FEDORA-2020-f92cd0e72b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-19344", "datePublished": "2020-01-21T00:00:00", "dateReserved": "2019-11-27T00:00:00", "dateUpdated": "2024-08-05T02:16:47.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-14383.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-14383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T15:10:17.178172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T15:47:32.520Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.11.15, samba 4.12.9, samba 4.13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba\u0027s DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-391", "description": "CWE-391", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T16:05:57.710729", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636" }, { "url": "https://www.samba.org/samba/security/CVE-2020-14383.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14383", "datePublished": "2020-12-02T00:00:00", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-15T15:47:32.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32746
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2022-32746.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:45.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-32746.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to samba 4.16.4, samba 4.15.9, samba 4.14.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:44.508667", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-32746.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-32746", "datePublished": "2022-08-25T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:45.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5252
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79733", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79733" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-5252.html" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "79733", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79733" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "SUSE-SU-2016:1105", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=4278ef25f64d5fdbf432ff1534e275416ec9561e" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-5252.html" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79733", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79733" }, { "name": "FEDORA-2015-0e0879cc8a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290288" }, { "name": "SUSE-SU-2016:0164", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "SUSE-SU-2016:1105", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" }, { "name": "FEDORA-2015-b36076d32e", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=4278ef25f64d5fdbf432ff1534e275416ec9561e", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=4278ef25f64d5fdbf432ff1534e275416ec9561e" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "https://www.samba.org/samba/security/CVE-2015-5252.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-5252.html" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5252", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10730
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:14.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-10730.html" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1121", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4884" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-02T15:06:19", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489%3B" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-10730.html" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1121", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "DSA-4884", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4884" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samba", "version": { "version_data": [ { "version_value": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489;", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849489;" }, { "name": "https://www.samba.org/samba/security/CVE-2020-10730.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-10730.html" }, { "name": "FEDORA-2020-5131d30947", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1121", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00000.html" }, { "name": "openSUSE-SU-2020:1313", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "DSA-4884", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4884" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10730", "datePublished": "2020-07-07T13:38:04", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:14:14.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10760
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B | x_refsource_MISC | |
https://www.samba.org/samba/security/CVE-2020-10760.html | x_refsource_MISC | |
https://usn.ubuntu.com/4409-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/202007-15 | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-10760.html" }, { "name": "USN-4409-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4409-1/" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All Samba versions before 4.10.17, 4.11.11, 4.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-23T04:06:19", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-10760.html" }, { "name": "USN-4409-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4409-1/" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samba", "version": { "version_data": [ { "version_value": "All Samba versions before 4.10.17, 4.11.11, 4.12.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509;", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509;" }, { "name": "https://www.samba.org/samba/security/CVE-2020-10760.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-10760.html" }, { "name": "USN-4409-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4409-1/" }, { "name": "FEDORA-2020-5131d30947", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "openSUSE-SU-2020:1313", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10760", "datePublished": "2020-07-06T18:02:10", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:14:15.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25717
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-25717.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.15.2, samba 4.14.10, samba 4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:17.315137", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672" }, { "url": "https://www.samba.org/samba/security/CVE-2020-25717.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25717", "datePublished": "2022-02-18T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42670
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-42670 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241885 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15473 | ||
https://www.samba.org/samba/security/CVE-2023-42670.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:40.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-42670" }, { "name": "RHBZ#2241885", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15473" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-42670.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T14:14:50.476521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:16:27.901Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://github.com/samba-team/samba", "defaultStatus": "unaffected", "packageName": "samba", "versions": [ { "lessThan": "4.17.12", "status": "affected", "version": "4.16.0", "versionType": "semver" }, { "lessThan": "4.18.8", "status": "affected", "version": "4.18.0", "versionType": "semver" }, { "status": "affected", "version": "4.19.0" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-10-10T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba\u0027s RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation \"classic DCs\") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as \"The procedure number is out of range\" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:42:08.337Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-42670" }, { "name": "RHBZ#2241885", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15473" }, { "url": "https://www.samba.org/samba/security/CVE-2023-42670.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-10T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: ad dc busy rpc multiple listener dos", "x_redhatCweChain": "CWE-400: Uncontrolled Resource Consumption" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-42670", "datePublished": "2023-11-03T07:58:04.881Z", "dateReserved": "2023-09-13T04:22:28.796Z", "dateUpdated": "2024-11-06T14:42:08.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4124
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "openSUSE-SU-2013:1339", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-4124" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "FEDORA-2013-14312", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html" }, { "name": "openSUSE-SU-2013:1349", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" }, { "name": "20130806 [slackware-security] samba (SSA:2013-218-03)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-4.0.8.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.6.17.html" }, { "name": "USN-1966-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1966-1" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "1028882", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028882" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.5.22.html" }, { "name": "samba-cve20134121-dos(86185)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86185" }, { "name": "MDVSA-2013:207", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:207" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401" }, { "name": "FEDORA-2013-14355", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html" }, { "name": "54519", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54519" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" }, { "name": "95969", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/95969" }, { "name": "RHSA-2013:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1543.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX03087", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "openSUSE-SU-2013:1339", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" }, { "name": "FEDORA-2014-9132", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-4124" }, { "name": "SSRT101413", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "FEDORA-2013-14312", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html" }, { "name": "openSUSE-SU-2013:1349", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" }, { "name": "20130806 [slackware-security] samba (SSA:2013-218-03)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-4.0.8.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.6.17.html" }, { "name": "USN-1966-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1966-1" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "1028882", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028882" }, { "name": "RHSA-2014:0305", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.5.22.html" }, { "name": "samba-cve20134121-dos(86185)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86185" }, { "name": "MDVSA-2013:207", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:207" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401" }, { "name": "FEDORA-2013-14355", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html" }, { "name": "54519", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54519" }, { "name": "RHSA-2013:1310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch" }, { "name": "RHSA-2013:1542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" }, { "name": "95969", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/95969" }, { "name": "RHSA-2013:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1543.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBUX03087", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "openSUSE-SU-2013:1339", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" }, { "name": "FEDORA-2014-9132", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html" }, { "name": "http://www.samba.org/samba/security/CVE-2013-4124", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2013-4124" }, { "name": "SSRT101413", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2" }, { "name": "FEDORA-2013-14312", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html" }, { "name": "openSUSE-SU-2013:1349", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" }, { "name": "20130806 [slackware-security] samba (SSA:2013-218-03)", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html" }, { "name": "http://www.samba.org/samba/history/samba-4.0.8.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-4.0.8.html" }, { "name": "http://www.samba.org/samba/history/samba-3.6.17.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-3.6.17.html" }, { "name": "USN-1966-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1966-1" }, { "name": "GLSA-201502-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "1028882", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1028882" }, { "name": "RHSA-2014:0305", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html" }, { "name": "http://www.samba.org/samba/history/samba-3.5.22.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-3.5.22.html" }, { "name": "samba-cve20134121-dos(86185)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86185" }, { "name": "MDVSA-2013:207", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:207" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=984401", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401" }, { "name": "FEDORA-2013-14355", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html" }, { "name": "54519", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54519" }, { "name": "RHSA-2013:1310", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html" }, { "name": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch", "refsource": "CONFIRM", "url": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch" }, { "name": "RHSA-2013:1542", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html" }, { "name": "95969", "refsource": "OSVDB", "url": "http://osvdb.org/95969" }, { "name": "RHSA-2013:1543", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1543.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4124", "datePublished": "2013-08-05T15:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:30:50.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2724
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91 | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2011-1220.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=726691 | x_refsource_CONFIRM | |
http://secunia.com/advisories/45798 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1025984 | vdb-entry, x_refsource_SECTRACK | |
http://openwall.com/lists/oss-security/2011/07/29/9 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:148 | vendor-advisory, x_refsource_MANDRIVA | |
http://comments.gmane.org/gmane.linux.kernel.cifs/3827 | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2011-1221.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:08:23.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91" }, { "name": "RHSA-2011:1220", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1220.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691" }, { "name": "45798", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45798" }, { "name": "1025984", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025984" }, { "name": "[oss-security] 20110729 CVE-2011-2724 assignment notification -- samba -- incomplete fix for CVE-2010-0547 issue", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/07/29/9" }, { "name": "MDVSA-2011:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://comments.gmane.org/gmane.linux.kernel.cifs/3827" }, { "name": "RHSA-2011:1221", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1221.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-06T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91" }, { "name": "RHSA-2011:1220", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1220.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691" }, { "name": "45798", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45798" }, { "name": "1025984", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025984" }, { "name": "[oss-security] 20110729 CVE-2011-2724 assignment notification -- samba -- incomplete fix for CVE-2010-0547 issue", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/07/29/9" }, { "name": "MDVSA-2011:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://comments.gmane.org/gmane.linux.kernel.cifs/3827" }, { "name": "RHSA-2011:1221", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1221.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2724", "datePublished": "2011-09-06T16:00:00", "dateReserved": "2011-07-11T00:00:00", "dateUpdated": "2024-08-06T23:08:23.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20251
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:37:23.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14611" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230331-0005/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Samba 4.1 and newer" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:39.991907", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929800" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14611" }, { "url": "https://security.netapp.com/advisory/ntap-20230331-0005/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-20251", "datePublished": "2023-03-06T00:00:00", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:37:23.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14323
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-14323", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T20:46:57.190199Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:12:19.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-14323.html" }, { "name": "openSUSE-SU-2020:1811", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" }, { "name": "openSUSE-SU-2020:1819", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" }, { "name": "FEDORA-2020-c1e9ae02d2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201103-0001/" }, { "name": "FEDORA-2020-2e1a1489be", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All samba versions before 4.11.15, before 4.12.9 and before 4.13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A null pointer dereference flaw was found in samba\u0027s Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T16:06:06.927583", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685" }, { "url": "https://www.samba.org/samba/security/CVE-2020-14323.html" }, { "name": "openSUSE-SU-2020:1811", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" }, { "name": "openSUSE-SU-2020:1819", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" }, { "name": "FEDORA-2020-c1e9ae02d2", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/" }, { "url": "https://security.netapp.com/advisory/ntap-20201103-0001/" }, { "name": "FEDORA-2020-2e1a1489be", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "name": "GLSA-202012-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202012-24" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14323", "datePublished": "2020-10-29T00:00:00", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14833
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14833.html" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-57d43f3b58", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:23.317523", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833" }, { "url": "https://www.samba.org/samba/security/CVE-2019-14833.html" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-57d43f3b58", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14833", "datePublished": "2019-11-06T00:00:00", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5330
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "USN-2856-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-5330.html" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "79734", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79734" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=f36cb71c330a52106e36028b3029d952257baf15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ba5dbda6d0174a59d221c45cca52ecd232820d48" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a118d4220ed85749c07fb43c1229d9e2fecbea6b" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "USN-2856-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=0454b95657846fcecf0f51b6f1194faac02518bd" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-5330.html" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=538d305de91e34a2938f5f219f18bf0e1918763f" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "79734", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79734" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.samba.org/?p=samba.git;a=commit;h=f36cb71c330a52106e36028b3029d952257baf15", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=f36cb71c330a52106e36028b3029d952257baf15" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=ba5dbda6d0174a59d221c45cca52ecd232820d48", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=ba5dbda6d0174a59d221c45cca52ecd232820d48" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b" }, { "name": "SUSE-SU-2016:0032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "USN-2856-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281326" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=0454b95657846fcecf0f51b6f1194faac02518bd", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=0454b95657846fcecf0f51b6f1194faac02518bd" }, { "name": "https://www.samba.org/samba/security/CVE-2015-5330.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-5330.html" }, { "name": "SUSE-SU-2016:0164", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=538d305de91e34a2938f5f219f18bf0e1918763f", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=538d305de91e34a2938f5f219f18bf0e1918763f" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "79734", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79734" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5330", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9461
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99455 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2017:2778 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2017:1950 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2017:2338 | vendor-advisory, x_refsource_REDHAT | |
https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310 | x_refsource_CONFIRM | |
https://bugzilla.samba.org/show_bug.cgi?id=12572 | x_refsource_CONFIRM | |
https://bugs.debian.org/864291 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:11:01.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99455", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99455" }, { "name": "RHSA-2017:2778", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "RHSA-2017:1950", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1950" }, { "name": "RHSA-2017:2338", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=12572" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/864291" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-09T22:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "99455", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99455" }, { "name": "RHSA-2017:2778", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "RHSA-2017:1950", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1950" }, { "name": "RHSA-2017:2338", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=12572" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/864291" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "99455", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99455" }, { "name": "RHSA-2017:2778", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "RHSA-2017:1950", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1950" }, { "name": "RHSA-2017:2338", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=12572", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=12572" }, { "name": "https://bugs.debian.org/864291", "refsource": "CONFIRM", "url": "https://bugs.debian.org/864291" }, { "name": "[debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-9461", "datePublished": "2017-06-06T21:00:00", "dateReserved": "2017-06-06T00:00:00", "dateUpdated": "2024-08-05T17:11:01.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1059
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/19468 | third-party-advisory, x_refsource_SECUNIA | |
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00114.html | vendor-advisory, x_refsource_FEDORA | |
http://www.osvdb.org/24263 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/17314 | vdb-entry, x_refsource_BID | |
http://www.trustix.org/errata/2006/0018 | vendor-advisory, x_refsource_TRUSTIX | |
http://secunia.com/advisories/19455 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/19539 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/1179 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1015850 | vdb-entry, x_refsource_SECTRACK | |
http://us1.samba.org/samba/security/CAN-2006-1059.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/429370/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25575 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:56:15.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19468" }, { "name": "FEDORA-2006-259", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00114.html" }, { "name": "24263", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24263" }, { "name": "17314", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17314" }, { "name": "2006-0018", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0018" }, { "name": "19455", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19455" }, { "name": "19539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19539" }, { "name": "ADV-2006-1179", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1179" }, { "name": "1015850", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015850" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CAN-2006-1059.html" }, { "name": "20060330 [SECURITY] Samba 3.0.21-3.0.21c: Exposure of machine account credentials in winbindd log files", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/429370/100/0/threaded" }, { "name": "samba-logfile-account-cleartext(25575)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25575" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "19468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19468" }, { "name": "FEDORA-2006-259", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00114.html" }, { "name": "24263", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24263" }, { "name": "17314", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17314" }, { "name": "2006-0018", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0018" }, { "name": "19455", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19455" }, { "name": "19539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19539" }, { "name": "ADV-2006-1179", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1179" }, { "name": "1015850", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015850" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CAN-2006-1059.html" }, { "name": "20060330 [SECURITY] Samba 3.0.21-3.0.21c: Exposure of machine account credentials in winbindd log files", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/429370/100/0/threaded" }, { "name": "samba-logfile-account-cleartext(25575)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25575" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-1059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19468", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19468" }, { "name": "FEDORA-2006-259", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00114.html" }, { "name": "24263", "refsource": "OSVDB", "url": "http://www.osvdb.org/24263" }, { "name": "17314", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17314" }, { "name": "2006-0018", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0018" }, { "name": "19455", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19455" }, { "name": "19539", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19539" }, { "name": "ADV-2006-1179", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1179" }, { "name": "1015850", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015850" }, { "name": "http://us1.samba.org/samba/security/CAN-2006-1059.html", "refsource": "CONFIRM", "url": "http://us1.samba.org/samba/security/CAN-2006-1059.html" }, { "name": "20060330 [SECURITY] Samba 3.0.21-3.0.21c: Exposure of machine account credentials in winbindd log files", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/429370/100/0/threaded" }, { "name": "samba-logfile-account-cleartext(25575)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25575" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-1059", "datePublished": "2006-03-30T17:00:00", "dateReserved": "2006-03-07T00:00:00", "dateUpdated": "2024-08-07T16:56:15.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14303
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-14303.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200709-0003/" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "USN-4454-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4454-2/" }, { "name": "USN-4454-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4454-1/" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-23T04:06:20", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2020-14303.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200709-0003/" }, { "name": "FEDORA-2020-5131d30947", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "USN-4454-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4454-2/" }, { "name": "USN-4454-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4454-1/" }, { "name": "openSUSE-SU-2020:1313", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samba", "version": { "version_data": [ { "version_value": "All Samba versions before 4.10.17, before 4.11.11 and before 4.12.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298;", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298;" }, { "name": "https://www.samba.org/samba/security/CVE-2020-14303.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2020-14303.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200709-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200709-0003/" }, { "name": "FEDORA-2020-5131d30947", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/" }, { "name": "openSUSE-SU-2020:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" }, { "name": "openSUSE-SU-2020:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" }, { "name": "GLSA-202007-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-15" }, { "name": "USN-4454-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4454-2/" }, { "name": "USN-4454-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4454-1/" }, { "name": "openSUSE-SU-2020:1313", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" }, { "name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14303", "datePublished": "2020-07-06T17:12:08", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2906
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/security/CVE-2009-2906.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9944", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "1021111", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "name": "58519", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58519" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "37428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37428" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "samba-smb-dos(53575)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53575" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "36573", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36573" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "oval:org.mitre.oval:def:7090", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36918" }, { "name": "1022976", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022976" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36893" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-01T00:00:00", "descriptions": [ { "lang": "en", "value": "smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/security/CVE-2009-2906.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.4.2/" }, { "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9944", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944" }, { "name": "FEDORA-2009-10172", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.2.15/" }, { "name": "1021111", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "name": "58519", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58519" }, { "name": "ADV-2009-2810", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "name": "SSA:2009-276-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "name": "37428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37428" }, { "name": "36937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36937" }, { "name": "USN-839-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-839-1" }, { "name": "samba-smb-dos(53575)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53575" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "36573", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36573" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.0.37/" }, { "name": "oval:org.mitre.oval:def:7090", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090" }, { "name": "36918", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36918" }, { "name": "1022976", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022976" }, { "name": "36893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36893" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.samba.org/releases/3.3.8/" }, { "name": "36953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "FEDORA-2009-10180", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-2906", "datePublished": "2009-10-07T18:00:00", "dateReserved": "2009-08-20T00:00:00", "dateUpdated": "2024-08-07T06:07:37.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0937
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5442 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/1873 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:31.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" }, { "name": "1873", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1873" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" }, { "name": "1873", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1873" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-brute-force(5442)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442" }, { "name": "1873", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1873" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0937", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:31.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:08:35.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32494", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32494" }, { "name": "32951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32951" }, { "name": "32919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32919" }, { "name": "36281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36281" }, { "name": "50230", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50230" }, { "name": "SSRT080172", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125003356619515\u0026w=2" }, { "name": "USN-680-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-680-1" }, { "name": "249087", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1" }, { "name": "SUSE-SR:2008:027", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" }, { "name": "HPSBTU02454", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125003356619515\u0026w=2" }, { "name": "1021287", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021287" }, { "name": "FEDORA-2008-10638", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html" }, { "name": "ADV-2008-3277", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3277" }, { "name": "SSA:2008-333-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.453684" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2008-4314.html" }, { "name": "ADV-2009-2245", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2245" }, { "name": "32968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32968" }, { "name": "ADV-2009-0067", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0067" }, { "name": "FEDORA-2008-10518", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch" }, { "name": "32813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a \"cut\u0026paste error\" that causes an improper bounds check to be performed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-12-10T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "32494", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32494" }, { "name": "32951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32951" }, { "name": "32919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32919" }, { "name": "36281", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36281" }, { "name": "50230", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50230" }, { "name": "SSRT080172", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125003356619515\u0026w=2" }, { "name": "USN-680-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-680-1" }, { "name": "249087", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1" }, { "name": "SUSE-SR:2008:027", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" }, { "name": "HPSBTU02454", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125003356619515\u0026w=2" }, { "name": "1021287", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021287" }, { "name": "FEDORA-2008-10638", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html" }, { "name": "ADV-2008-3277", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3277" }, { "name": "SSA:2008-333-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.453684" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2008-4314.html" }, { "name": "ADV-2009-2245", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2245" }, { "name": "32968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32968" }, { "name": "ADV-2009-0067", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0067" }, { "name": "FEDORA-2008-10518", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch" }, { "name": "32813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32813" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-4314", "datePublished": "2008-12-01T15:00:00", "dateReserved": "2008-09-29T00:00:00", "dateUpdated": "2024-08-07T10:08:35.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0815
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us4.samba.org/samba/news/#security_2.2.12" }, { "name": "200529", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1" }, { "name": "20040930 Samba Security Announcement -- Potential Arbitrary File Access", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109655827913457\u0026w=2" }, { "name": "FLSA:2102", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2102" }, { "name": "20040930 Samba Arbitrary File Access Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=146\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/377618" }, { "name": "DSA-600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-600" }, { "name": "RHSA-2004:498", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-498.html" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "11281", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11281" }, { "name": "MDKSA-2004:104", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104" }, { "name": "2004-0051", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0051/" }, { "name": "57664", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "SUSE-SA:2004:035", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_35_samba.html" }, { "name": "samba-file-access(17556)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17556" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via \"/.////\" style sequences in pathnames." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us4.samba.org/samba/news/#security_2.2.12" }, { "name": "200529", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1" }, { "name": "20040930 Samba Security Announcement -- Potential Arbitrary File Access", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109655827913457\u0026w=2" }, { "name": "FLSA:2102", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2102" }, { "name": "20040930 Samba Arbitrary File Access Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=146\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/377618" }, { "name": "DSA-600", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-600" }, { "name": "RHSA-2004:498", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-498.html" }, { "name": "CLA-2004:873", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "11281", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11281" }, { "name": "MDKSA-2004:104", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104" }, { "name": "2004-0051", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0051/" }, { "name": "57664", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "SUSE-SA:2004:035", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_35_samba.html" }, { "name": "samba-file-access(17556)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17556" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via \"/.////\" style sequences in pathnames." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://us4.samba.org/samba/news/#security_2.2.12", "refsource": "CONFIRM", "url": "http://us4.samba.org/samba/news/#security_2.2.12" }, { "name": "200529", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1" }, { "name": "20040930 Samba Security Announcement -- Potential Arbitrary File Access", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109655827913457\u0026w=2" }, { "name": "FLSA:2102", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2102" }, { "name": "20040930 Samba Arbitrary File Access Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=146\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/377618" }, { "name": "DSA-600", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-600" }, { "name": "RHSA-2004:498", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-498.html" }, { "name": "CLA-2004:873", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873" }, { "name": "11281", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11281" }, { "name": "MDKSA-2004:104", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104" }, { "name": "2004-0051", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0051/" }, { "name": "57664", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "SUSE-SA:2004:035", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_35_samba.html" }, { "name": "samba-file-access(17556)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17556" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0815", "datePublished": "2004-10-16T04:00:00", "dateReserved": "2004-08-25T00:00:00", "dateUpdated": "2024-08-08T00:31:47.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBUX03320", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2" }, { "name": "RHSA-2015:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html" }, { "name": "RHSA-2015:0254", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0084.html" }, { "name": "SSA:2015-064-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345" }, { "name": "36741", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/36741/" }, { "name": "RHSA-2015:0250", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/product_security/samba_remote_vuln" }, { "name": "SSRT101952", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2" }, { "name": "USN-2508-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2508-1" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "SUSE-SU-2015:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" }, { "name": "RHSA-2015:0253", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-0240" }, { "name": "72711", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72711" }, { "name": "RHSA-2015:0249", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html" }, { "name": "RHSA-2015:0251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "DSA-3171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3171" }, { "name": "1031783", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031783" }, { "name": "RHSA-2015:0252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "HPSBGN03288", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln" }, { "name": "MDVSA-2015:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081" }, { "name": "RHSA-2015:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/articles/1346913" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "openSUSE-SU-2015:0375", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" }, { "name": "RHSA-2015:0256", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html" }, { "name": "SSRT101979", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2" }, { "name": "SUSE-SU-2015:0371", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" }, { "name": "SUSE-SU-2015:0353", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBUX03320", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2" }, { "name": "RHSA-2015:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html" }, { "name": "RHSA-2015:0254", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0084.html" }, { "name": "SSA:2015-064-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.360345" }, { "name": "36741", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/36741/" }, { "name": "RHSA-2015:0250", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/product_security/samba_remote_vuln" }, { "name": "SSRT101952", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039217203031\u0026w=2" }, { "name": "USN-2508-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2508-1" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "SUSE-SU-2015:0386", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" }, { "name": "RHSA-2015:0253", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-0240" }, { "name": "72711", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72711" }, { "name": "RHSA-2015:0249", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html" }, { "name": "RHSA-2015:0251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html" }, { "name": "GLSA-201502-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml" }, { "name": "DSA-3171", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3171" }, { "name": "1031783", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031783" }, { "name": "RHSA-2015:0252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325" }, { "name": "MDVSA-2015:082", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082" }, { "name": "HPSBGN03288", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln" }, { "name": "MDVSA-2015:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081" }, { "name": "RHSA-2015:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/articles/1346913" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "openSUSE-SU-2015:0375", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" }, { "name": "RHSA-2015:0256", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html" }, { "name": "SSRT101979", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142722696102151\u0026w=2" }, { "name": "SUSE-SU-2015:0371", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" }, { "name": "SUSE-SU-2015:0353", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0240", "datePublished": "2015-02-24T01:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16853
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853 | x_refsource_CONFIRM | |
https://www.samba.org/samba/security/CVE-2018-16853.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106026 | vdb-entry, x_refsource_BID | |
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16853.html" }, { "name": "106026", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106026" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.7.12" }, { "status": "affected", "version": "4.8.7" }, { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-16853.html" }, { "name": "106026", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106026" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16853", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.7.12" }, { "version_value": "4.8.7" }, { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853" }, { "name": "https://www.samba.org/samba/security/CVE-2018-16853.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-16853.html" }, { "name": "106026", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106026" }, { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16853", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2126
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2016-2126.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037495 | vdb-entry, x_refsource_SECTRACK | |
http://rhn.redhat.com/errata/RHSA-2017-0495.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2017-0494.html | vendor-advisory, x_refsource_REDHAT | |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2017:1265 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/94994 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2017-0744.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2017-0662.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2126.html" }, { "name": "1037495", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037495" }, { "name": "RHSA-2017:0495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "name": "RHSA-2017:0494", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94994", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94994" }, { "name": "RHSA-2017:0744", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2126.html" }, { "name": "1037495", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037495" }, { "name": "RHSA-2017:0495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "name": "RHSA-2017:0494", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94994", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94994" }, { "name": "RHSA-2017:0744", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2016-2126.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2126.html" }, { "name": "1037495", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037495" }, { "name": "RHSA-2017:0495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "name": "RHSA-2017:0494", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730", "refsource": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730" }, { "name": "RHSA-2017:1265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94994", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94994" }, { "name": "RHSA-2017:0744", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2126", "datePublished": "2017-05-11T14:01:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12151
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20170921-0001/ | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2017:2790 | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100917 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-3983 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2017:2858 | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1039401 | vdb-entry, x_refsource_SECTRACK | |
https://www.samba.org/samba/security/CVE-2017-12151.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151" }, { "name": "100917", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039401" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-12151.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "4.4.16" }, { "status": "affected", "version": "4.5.14" }, { "status": "affected", "version": "4.6.8" } ] } ], "datePublic": "2017-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-300", "description": "CWE-300", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-31T15:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151" }, { "name": "100917", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-12151.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-12151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.4.16" }, { "version_value": "4.5.14" }, { "version_value": "4.6.8" } ] } } ] }, "vendor_name": "Samba" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-300" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20170921-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151" }, { "name": "100917", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100917" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "DSA-3983", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039401" }, { "name": "https://www.samba.org/samba/security/CVE-2017-12151.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-12151.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-12151", "datePublished": "2018-07-27T12:00:00", "dateReserved": "2017-08-01T00:00:00", "dateUpdated": "2024-08-05T18:28:16.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25289" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25772" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "1018049", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018049" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "2701", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2701" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25241" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25259" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure Can Result in User Privilege Elevation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468548/100/0/threaded" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "USN-460-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-460-2" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25246" }, { "name": "34698", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34698" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25255" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2007-2444.html" }, { "name": "23974", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23974" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25675" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-200705-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml" }, { "name": "25289", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25289" }, { "name": "ADV-2007-1805", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1805" }, { "name": "25772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25772" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "SUSE-SA:2007:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html" }, { "name": "25270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25270" }, { "name": "20070515 FLEA-2007-0017-1: samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded" }, { "name": "ADV-2007-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2281" }, { "name": "ADV-2007-2210", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2210" }, { "name": "HPSBTU02218", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "2007-0017", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0017/" }, { "name": "1018049", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018049" }, { "name": "USN-460-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-460-1" }, { "name": "2701", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2701" }, { "name": "25241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25241" }, { "name": "MDKSA-2007:104", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104" }, { "name": "25256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25256" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1366" }, { "name": "25259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25259" }, { "name": "SSA:2007-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906" }, { "name": "102964", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1" }, { "name": "DSA-1291", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1291" }, { "name": "20070513 [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure Can Result in User Privilege Elevation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468548/100/0/threaded" }, { "name": "SSRT071424", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980" }, { "name": "25232", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25232" }, { "name": "25251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25251" }, { "name": "200588", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1" }, { "name": "USN-460-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-460-2" }, { "name": "25246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25246" }, { "name": "34698", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34698" }, { "name": "25255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25255" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2007-2444.html" }, { "name": "23974", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23974" }, { "name": "25675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25675" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-2444", "datePublished": "2007-05-14T21:00:00", "dateReserved": "2007-05-02T00:00:00", "dateUpdated": "2024-08-07T13:42:33.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0817
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/47763 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html | vendor-advisory, x_refsource_SUSE | |
http://www.samba.org/samba/history/samba-3.6.3.html | x_refsource_CONFIRM | |
http://www.samba.org/samba/security/CVE-2012-0817 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/48879 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "47763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47763" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.6.3.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2012-0817" }, { "name": "FEDORA-2012-1098", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "47763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47763" }, { "name": "SUSE-SU-2012:0515", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "name": "SUSE-SU-2012:0502", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.6.3.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2012-0817" }, { "name": "FEDORA-2012-1098", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html" }, { "name": "48879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48879" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0817", "datePublished": "2012-01-30T17:00:00", "dateReserved": "2012-01-19T00:00:00", "dateUpdated": "2024-08-06T18:38:14.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3223
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-3223.html" }, { "name": "USN-2856-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79731", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79731" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-3223.html" }, { "name": "USN-2856-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79731", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79731" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290287" }, { "name": "FEDORA-2015-0e0879cc8a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "https://www.samba.org/samba/security/CVE-2015-3223.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-3223.html" }, { "name": "USN-2856-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2856-1" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79731", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79731" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=ec504dbf69636a554add1f3d5703dd6c3ad450b8", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=ec504dbf69636a554add1f3d5703dd6c3ad450b8" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3223", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12163
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "name": "100925", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100925" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-12163.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_17_57_Samba" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039401" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "RHSA-2017:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2791" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "4.7" }, { "status": "affected", "version": "4.6.8" }, { "status": "affected", "version": "4.5.14" }, { "status": "affected", "version": "4.4.16" } ] } ], "datePublic": "2017-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-30T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "name": "100925", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100925" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-12163.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_17_57_Samba" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "RHSA-2017:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2791" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-12163", "datePublished": "2018-07-26T16:00:00", "dateReserved": "2017-08-01T00:00:00", "dateUpdated": "2024-08-05T18:28:16.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0201
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:36.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2003:624", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000624" }, { "name": "20030408 [Sorcerer-spells] SAMBA--SORCERER2003-04-08", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104981682014565\u0026w=2" }, { "name": "20030403-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030403-01-P" }, { "name": "SuSE-SA:2003:025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2003_025_samba.html" }, { "name": "7294", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7294" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digitaldefense.net/labs/advisories/DDI-1013.txt" }, { "name": "20030407 [DDI-1013] Buffer Overflow in Samba allows remote root compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104972664226781\u0026w=2" }, { "name": "DSA-280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "20030409 GLSA: samba (200304-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104994564212488\u0026w=2" }, { "name": "VU#267873", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/267873" }, { "name": "MDKSA-2003:044", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" }, { "name": "oval:org.mitre.oval:def:567", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A567" }, { "name": "oval:org.mitre.oval:def:2163", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2163" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2003:624", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000624" }, { "name": "20030408 [Sorcerer-spells] SAMBA--SORCERER2003-04-08", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104981682014565\u0026w=2" }, { "name": "20030403-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030403-01-P" }, { "name": "SuSE-SA:2003:025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2003_025_samba.html" }, { "name": "7294", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7294" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digitaldefense.net/labs/advisories/DDI-1013.txt" }, { "name": "20030407 [DDI-1013] Buffer Overflow in Samba allows remote root compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104972664226781\u0026w=2" }, { "name": "DSA-280", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "20030409 GLSA: samba (200304-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104994564212488\u0026w=2" }, { "name": "VU#267873", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/267873" }, { "name": "MDKSA-2003:044", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" }, { "name": "oval:org.mitre.oval:def:567", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A567" }, { "name": "oval:org.mitre.oval:def:2163", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2163" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0201", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2003:624", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000624" }, { "name": "20030408 [Sorcerer-spells] SAMBA--SORCERER2003-04-08", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104981682014565\u0026w=2" }, { "name": "20030403-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20030403-01-P" }, { "name": "SuSE-SA:2003:025", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2003_025_samba.html" }, { "name": "7294", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7294" }, { "name": "http://www.digitaldefense.net/labs/advisories/DDI-1013.txt", "refsource": "MISC", "url": "http://www.digitaldefense.net/labs/advisories/DDI-1013.txt" }, { "name": "20030407 [DDI-1013] Buffer Overflow in Samba allows remote root compromise", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104972664226781\u0026w=2" }, { "name": "DSA-280", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-280" }, { "name": "20030409 GLSA: samba (200304-02)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104994564212488\u0026w=2" }, { "name": "VU#267873", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/267873" }, { "name": "MDKSA-2003:044", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:044" }, { "name": "RHSA-2003:137", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-137.html" }, { "name": "20030407 Immunix Secured OS 7+ samba update", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" }, { "name": "oval:org.mitre.oval:def:567", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A567" }, { "name": "oval:org.mitre.oval:def:2163", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2163" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0201", "datePublished": "2003-04-15T04:00:00", "dateReserved": "2003-04-04T00:00:00", "dateUpdated": "2024-08-08T01:43:36.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0922
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-0922.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "FEDORA-2023-1c172e3264", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.18.1, samba 4.17.7, samba 4.16.10" } ] } ], "descriptions": [ { "lang": "en", "value": "The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:29.031505", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2023-0922.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230406-0007/" }, { "name": "FEDORA-2023-1c172e3264", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-0922", "datePublished": "2023-04-03T00:00:00", "dateReserved": "2023-02-20T00:00:00", "dateUpdated": "2024-08-02T05:24:34.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25719
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-25719.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.15.2, samba 4.14.10, samba 4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:50.287379", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019732" }, { "url": "https://www.samba.org/samba/security/CVE-2020-25719.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25719", "datePublished": "2022-02-18T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7494
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98636", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98636" }, { "name": "DSA-3860", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3860" }, { "name": "42084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42084/" }, { "name": "RHSA-2017:1270", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1270" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-7494.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf\u0026p_Doc_Ref=SEVD-2018-095-01" }, { "name": "RHSA-2017:1390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1390" }, { "name": "1038552", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038552" }, { "name": "RHSA-2017:1273", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1273" }, { "name": "RHSA-2017:1271", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1271" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03759en_us" }, { "name": "RHSA-2017:1272", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1272" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170524-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us" }, { "name": "42060", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "since 3.5.0" } ] } ], "datePublic": "2017-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it." } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-21T09:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "98636", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98636" }, { "name": "DSA-3860", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3860" }, { "name": "42084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42084/" }, { "name": "RHSA-2017:1270", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1270" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-7494.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf\u0026p_Doc_Ref=SEVD-2018-095-01" }, { "name": "RHSA-2017:1390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1390" }, { "name": "1038552", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038552" }, { "name": "RHSA-2017:1273", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1273" }, { "name": "RHSA-2017:1271", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1271" }, { "name": "GLSA-201805-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-07" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03759en_us" }, { "name": "RHSA-2017:1272", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1272" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170524-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us" }, { "name": "42060", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42060/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7494", "datePublished": "2017-05-30T18:00:00", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-08-05T16:04:11.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1434-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1434-1" }, { "name": "81648", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81648" }, { "name": "SUSE-SU-2012:0591", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html" }, { "name": "MDVSA-2012:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067" }, { "name": "48996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48996" }, { "name": "FEDORA-2012-6981", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html" }, { "name": "49017", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49017" }, { "name": "1026988", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026988" }, { "name": "HPSBUX02789", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2012-2111" }, { "name": "48976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48976" }, { "name": "openSUSE-SU-2012:0583", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html" }, { "name": "FEDORA-2012-6999", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html" }, { "name": "49030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49030" }, { "name": "FEDORA-2012-7006", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578" }, { "name": "48984", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48984" }, { "name": "48999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48999" }, { "name": "SUSE-SU-2012:0573", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html" }, { "name": "DSA-2463", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2463" }, { "name": "SSRT100824", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "RHSA-2012:0533", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the \"take ownership\" privilege via an LSA connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-1434-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1434-1" }, { "name": "81648", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81648" }, { "name": "SUSE-SU-2012:0591", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html" }, { "name": "MDVSA-2012:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067" }, { "name": "48996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48996" }, { "name": "FEDORA-2012-6981", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html" }, { "name": "49017", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49017" }, { "name": "1026988", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026988" }, { "name": "HPSBUX02789", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2012-2111" }, { "name": "48976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48976" }, { "name": "openSUSE-SU-2012:0583", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html" }, { "name": "FEDORA-2012-6999", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html" }, { "name": "49030", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49030" }, { "name": "FEDORA-2012-7006", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578" }, { "name": "48984", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48984" }, { "name": "48999", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48999" }, { "name": "SUSE-SU-2012:0573", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html" }, { "name": "DSA-2463", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2463" }, { "name": "SSRT100824", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "name": "RHSA-2012:0533", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2111", "datePublished": "2012-04-30T14:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:26:08.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2125
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0495.html | vendor-advisory, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2017-0494.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1037494 | vdb-entry, x_refsource_SECTRACK | |
https://access.redhat.com/errata/RHSA-2017:1265 | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/94988 | vdb-entry, x_refsource_BID | |
https://www.samba.org/samba/security/CVE-2016-2125.html | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2017-0744.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2017-0662.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:0495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125" }, { "name": "RHSA-2017:0494", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "name": "1037494", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037494" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94988", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94988" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2125.html" }, { "name": "RHSA-2017:0744", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.5.3" }, { "status": "affected", "version": "4.4.8" }, { "status": "affected", "version": "4.3.13" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-01T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2017:0495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125" }, { "name": "RHSA-2017:0494", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "name": "1037494", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037494" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94988", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94988" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2125.html" }, { "name": "RHSA-2017:0744", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.5.3" }, { "version_value": "4.4.8" }, { "version_value": "4.3.13" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" } ], [ { "vectorString": "4.3/AV:A/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125" }, { "name": "RHSA-2017:0494", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html" }, { "name": "1037494", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037494" }, { "name": "RHSA-2017:1265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "94988", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94988" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2125.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2125.html" }, { "name": "RHSA-2017:0744", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html" }, { "name": "RHSA-2017:0662", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2125", "datePublished": "2018-10-31T20:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79732", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79732" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-5296.html" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a819d2b440aafa3138d95ff6e8b824da885a70e9" }, { "name": "FEDORA-2015-0e0879cc8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=1ba49b8f389eda3414b14410c7fbcb4041ca06b1" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79732", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79732" }, { "name": "SUSE-SU-2016:0164", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=d724f835acb9f4886c0001af32cd325dbbf1f895" }, { "name": "1034493", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-5296.html" }, { "name": "USN-2855-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9" }, { "name": "FEDORA-2015-0e0879cc8a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2855-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-2" }, { "name": "SUSE-SU-2016:0032", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" }, { "name": "SUSE-SU-2015:2304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "name": "SUSE-SU-2015:2305", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" }, { "name": "79732", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79732" }, { "name": "SUSE-SU-2016:0164", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" }, { "name": "openSUSE-SU-2015:2354", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" }, { "name": "FEDORA-2015-b36076d32e", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" }, { "name": "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895", "refsource": "CONFIRM", "url": "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895" }, { "name": "1034493", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034493" }, { "name": "DSA-3433", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3433" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292" }, { "name": "https://www.samba.org/samba/security/CVE-2015-5296.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-5296.html" }, { "name": "USN-2855-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2855-1" }, { "name": "openSUSE-SU-2015:2356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5296", "datePublished": "2015-12-29T22:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16841
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106023 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3827-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3827-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.netapp.com/advisory/ntap-20181127-0001/ | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4345 | vendor-advisory, x_refsource_DEBIAN | |
https://www.samba.org/samba/security/CVE-2018-16841.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.002Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106023", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106023" }, { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-16841.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.7.12" }, { "status": "affected", "version": "4.8.7" }, { "status": "affected", "version": "4.9.3" } ] } ], "datePublic": "2018-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba\u0027s KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:10", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "106023", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106023" }, { "name": "USN-3827-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3827-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841" }, { "name": "DSA-4345", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4345" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-16841.html" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16841", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.7.12" }, { "version_value": "4.8.7" }, { "version_value": "4.9.3" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba\u0027s KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "106023", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106023" }, { "name": "USN-3827-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-2/" }, { "name": "USN-3827-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3827-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20181127-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20181127-0001/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841" }, { "name": "DSA-4345", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4345" }, { "name": "https://www.samba.org/samba/security/CVE-2018-16841.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-16841.html" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16841", "datePublished": "2018-11-28T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.002Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3870
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/ | vendor-advisory, x_refsource_FEDORA | |
https://www.samba.org/samba/security/CVE-2019-3870.html | x_refsource_MISC | |
https://bugzilla.samba.org/show_bug.cgi?id=13834 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870 | x_refsource_CONFIRM | |
https://www.synology.com/security/advisory/Synology_SA_19_15 | x_refsource_CONFIRM | |
https://support.f5.com/csp/article/K20804356 | x_refsource_CONFIRM |
▼ | Vendor | Product |
---|---|---|
The Samba Project | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2019-cacf88eabf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "name": "FEDORA-2019-db21b5f1d2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-3870.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13834" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K20804356" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Project", "versions": [ { "status": "affected", "version": "4.9.6" }, { "status": "affected", "version": "4.10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-04T18:00:59", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2019-cacf88eabf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "name": "FEDORA-2019-db21b5f1d2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.samba.org/samba/security/CVE-2019-3870.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=13834" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K20804356" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.9.6" }, { "version_value": "4.10.2" } ] } } ] }, "vendor_name": "The Samba Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update." } ] }, "impact": { "cvss": [ [ { "vectorString": "6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-276" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2019-cacf88eabf", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/" }, { "name": "FEDORA-2019-db21b5f1d2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/" }, { "name": "https://www.samba.org/samba/security/CVE-2019-3870.html", "refsource": "MISC", "url": "https://www.samba.org/samba/security/CVE-2019-3870.html" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=13834", "refsource": "MISC", "url": "https://bugzilla.samba.org/show_bug.cgi?id=13834" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3870" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_15" }, { "name": "https://support.f5.com/csp/article/K20804356", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K20804356" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3870", "datePublished": "2019-04-09T15:17:43", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0930
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:48.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-22-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-22-1/" }, { "name": "samba-msfnmatch-dos(17987)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17987" }, { "name": "MDKSA-2004:131", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:131" }, { "name": "CLA-2004:899", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "20041108 Samba SMBD Remote Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=156\u0026type=vulnerabilities\u0026flashstatus=false" }, { "name": "101783", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1" }, { "name": "OpenPKG-SA-2004.054", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "GLSA-200411-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml" }, { "name": "11624", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11624" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "SUSE-SA:2004:040", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "oval:org.mitre.oval:def:10936", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "20041108 [SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109993720717957\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-22-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://www.ubuntu.com/usn/usn-22-1/" }, { "name": "samba-msfnmatch-dos(17987)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17987" }, { "name": "MDKSA-2004:131", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:131" }, { "name": "CLA-2004:899", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "20041108 Samba SMBD Remote Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=156\u0026type=vulnerabilities\u0026flashstatus=false" }, { "name": "101783", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1" }, { "name": "OpenPKG-SA-2004.054", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "APPLE-SA-2005-03-21", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "GLSA-200411-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml" }, { "name": "11624", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11624" }, { "name": "20041201-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "SUSE-SA:2004:040", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "oval:org.mitre.oval:def:10936", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936" }, { "name": "SCOSA-2005.17", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "20041108 [SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109993720717957\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-22-1", "refsource": "UBUNTU", "url": "https://www.ubuntu.com/usn/usn-22-1/" }, { "name": "samba-msfnmatch-dos(17987)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17987" }, { "name": "MDKSA-2004:131", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:131" }, { "name": "CLA-2004:899", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000899" }, { "name": "20041108 Samba SMBD Remote Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=156\u0026type=vulnerabilities\u0026flashstatus=false" }, { "name": "101783", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1" }, { "name": "OpenPKG-SA-2004.054", "refsource": "OPENPKG", "url": "http://marc.info/?l=bugtraq\u0026m=110330519803655\u0026w=2" }, { "name": "APPLE-SA-2005-03-21", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" }, { "name": "GLSA-200411-21", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml" }, { "name": "11624", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11624" }, { "name": "20041201-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P" }, { "name": "SUSE-SA:2004:040", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_40_samba.html" }, { "name": "oval:org.mitre.oval:def:10936", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936" }, { "name": "SCOSA-2005.17", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt" }, { "name": "20041108 [SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109993720717957\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0930", "datePublished": "2004-11-19T05:00:00", "dateReserved": "2004-10-04T00:00:00", "dateUpdated": "2024-08-08T00:31:48.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4154
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-4154 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241883 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15424 | ||
https://security.netapp.com/advisory/ntap-20231124-0002/ | ||
https://www.samba.org/samba/security/CVE-2023-4154.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:12.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-4154" }, { "name": "RHBZ#2241883", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241883" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15424" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-4154.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "unaffected", "version": "4.19.1" }, { "status": "unaffected", "version": "4.18.8" }, { "status": "unaffected", "version": "4.17.12" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" }, { "collectionURL": "https://packages.fedoraproject.org/", "defaultStatus": "affected", "packageName": "samba", "product": "Fedora", "vendor": "Fedora" } ], "datePublic": "2023-10-10T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A design flaw was found in Samba\u0027s DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-23T01:33:49.736Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-4154" }, { "name": "RHBZ#2241883", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241883" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15424" }, { "url": "https://security.netapp.com/advisory/ntap-20231124-0002/" }, { "url": "https://www.samba.org/samba/security/CVE-2023-4154.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-10T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: ad dc password exposure to privileged users and rodcs", "x_redhatCweChain": "CWE-787: Out-of-bounds Write" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-4154", "datePublished": "2023-11-07T19:14:28.305Z", "dateReserved": "2023-08-04T13:22:07.200Z", "dateUpdated": "2024-08-02T07:17:12.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2113.html" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2113.html" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2113.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2113.html" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2113", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20316
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:37:23.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14842" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-20316.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2021-20316" }, { "tags": [ "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-20316" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects samba file server before v4.15.0, Fixed in samba v4.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:56.731120", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14842" }, { "url": "https://www.samba.org/samba/security/CVE-2021-20316.html" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673" }, { "url": "https://access.redhat.com/security/cve/CVE-2021-20316" }, { "url": "https://security-tracker.debian.org/tracker/CVE-2021-20316" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-20316", "datePublished": "2022-08-23T00:00:00", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:37:23.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32742
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-32742", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T19:44:06.990019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:16:26.003Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:44.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-32742.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to samba 4.16.4, samba 4.15.9, samba 4.14.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T16:06:03.244228", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-32742.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "name": "[debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-32742", "datePublished": "2022-08-25T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:44.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10218
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:19.002Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-10218.html" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-57d43f3b58", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "all samba versions before samba 4.11.2, 4.10.10 and 4.9.15" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T16:06:19.599308", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218" }, { "url": "https://www.samba.org/samba/security/CVE-2019-10218.html" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_35" }, { "name": "openSUSE-SU-2019:2458", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" }, { "name": "FEDORA-2019-57d43f3b58", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/" }, { "name": "FEDORA-2019-703e299870", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/" }, { "name": "FEDORA-2019-460ad648e7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[debian-lts-announce] 20230914 [SECURITY] [DLA 3563-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-10218", "datePublished": "2019-11-06T00:00:00", "dateReserved": "2019-03-27T00:00:00", "dateUpdated": "2024-08-04T22:17:19.002Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/30837 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/31601 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1020770 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44678 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2008/2440 | vdb-entry, x_refsource_VUPEN | |
http://samba.org/samba/security/CVE-2008-3789.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2008/08/26/2 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:53:00.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073" }, { "name": "30837", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30837" }, { "name": "31601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31601" }, { "name": "1020770", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020770" }, { "name": "samba-groupmapping-security-bypass(44678)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44678" }, { "name": "ADV-2008-2440", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2440" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/security/CVE-2008-3789.html" }, { "name": "[oss-security] 20080826 CVE Request (samba)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/08/26/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073" }, { "name": "30837", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30837" }, { "name": "31601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31601" }, { "name": "1020770", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020770" }, { "name": "samba-groupmapping-security-bypass(44678)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44678" }, { "name": "ADV-2008-2440", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2440" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/security/CVE-2008-3789.html" }, { "name": "[oss-security] 20080826 CVE Request (samba)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/08/26/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073" }, { "name": "30837", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30837" }, { "name": "31601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31601" }, { "name": "1020770", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020770" }, { "name": "samba-groupmapping-security-bypass(44678)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44678" }, { "name": "ADV-2008-2440", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2440" }, { "name": "http://samba.org/samba/security/CVE-2008-3789.html", "refsource": "CONFIRM", "url": "http://samba.org/samba/security/CVE-2008-3789.html" }, { "name": "[oss-security] 20080826 CVE Request (samba)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/08/26/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3789", "datePublished": "2008-08-27T20:00:00", "dateReserved": "2008-08-26T00:00:00", "dateUpdated": "2024-08-07T09:53:00.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5568
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-5568 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2245174 | issue-tracking, x_refsource_REDHAT | |
https://bugzilla.samba.org/show_bug.cgi?id=15491 | ||
https://www.samba.org/samba/history/samba-4.19.2.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5568" }, { "name": "RHBZ#2245174", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15491" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231124-0007/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.19.2.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5568", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T19:44:09.639707Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T20:00:25.977Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "unaffected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-10-09T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Low" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T04:40:06.963Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5568" }, { "name": "RHBZ#2245174", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15491" }, { "url": "https://www.samba.org/samba/history/samba-4.19.2.html" } ], "timeline": [ { "lang": "en", "time": "2023-10-19T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-09T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: heap buffer overflow with freshness tokens in the heimdal kdc", "x_redhatCweChain": "CWE-122: Heap-based Buffer Overflow" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-5568", "datePublished": "2023-10-24T21:56:41.633Z", "dateReserved": "2023-10-13T07:06:17.684Z", "dateUpdated": "2024-09-18T04:40:06.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8143
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2015-020-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.416326" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch" }, { "name": "1031615", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031615" }, { "name": "samba-cve20148143-priv-esc(100596)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2014-8143" }, { "name": "72278", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72278" }, { "name": "62594", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62594" }, { "name": "openSUSE-SU-2015:0375", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" }, { "name": "USN-2481-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2481-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2015-020-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.416326" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch" }, { "name": "1031615", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031615" }, { "name": "samba-cve20148143-priv-esc(100596)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2014-8143" }, { "name": "72278", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72278" }, { "name": "62594", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62594" }, { "name": "openSUSE-SU-2015:0375", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" }, { "name": "USN-2481-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2481-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2015-020-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.416326" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch", "refsource": "CONFIRM", "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch" }, { "name": "1031615", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031615" }, { "name": "samba-cve20148143-priv-esc(100596)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596" }, { "name": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch", "refsource": "CONFIRM", "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch" }, { "name": "https://www.samba.org/samba/security/CVE-2014-8143", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2014-8143" }, { "name": "72278", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72278" }, { "name": "62594", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62594" }, { "name": "openSUSE-SU-2015:0375", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" }, { "name": "USN-2481-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2481-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8143", "datePublished": "2015-01-17T02:00:00", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:51.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34967
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2023:6667 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2023:7139 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0423 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:0580 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2023-34967 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2222794 | issue-tracking, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2023-34967.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:17:04.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34967" }, { "name": "RHBZ#2222794", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230731-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5477" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2023-34967.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-1.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.17.5-5.el8_8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.18.6-100.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:4.15.5-15.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "samba4", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "samba", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:storage:3" ], "defaultStatus": "affected", "packageName": "samba", "product": "Red Hat Storage 3", "vendor": "Red Hat" } ], "datePublic": "2023-07-19T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A Type Confusion vulnerability was found in Samba\u0027s mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T12:14:52.690Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2023:6667", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:6667" }, { "name": "RHSA-2023:7139", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2023:7139" }, { "name": "RHSA-2024:0423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0423" }, { "name": "RHSA-2024:0580", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0580" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-34967" }, { "name": "RHBZ#2222794", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794" }, { "url": "https://www.samba.org/samba/security/CVE-2023-34967.html" } ], "timeline": [ { "lang": "en", "time": "2023-07-13T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-07-19T00:00:00+00:00", "value": "Made public." } ], "title": "Samba: type confusion in mdssvc rpc service for spotlight", "workarounds": [ { "lang": "en", "value": "As a possible workaround, disable Spotlight by removing all configuration stanzas (\"spotlight=yes|true\") that enable Spotlight ." } ], "x_redhatCweChain": "CWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-34967", "datePublished": "2023-07-20T14:57:45.624Z", "dateReserved": "2023-06-07T21:11:04.261Z", "dateUpdated": "2024-09-16T12:14:52.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3738
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:07.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2021-3738.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=14468" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Affects all versions since samba 4.0 | Fixedin samba v4.15.2, v4.14.10 and v4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called \u0027association groups\u0027. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid \u0027struct session_info\u0027. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 - Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:18.717152", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2021-3738.html" }, { "url": "https://bugzilla.samba.org/show_bug.cgi?id=14468" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-3738", "datePublished": "2022-03-02T00:00:00", "dateReserved": "2021-08-26T00:00:00", "dateUpdated": "2024-08-03T17:01:07.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2522
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:34.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2011:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "74071", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/74071" }, { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100664", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "HPSBUX02768", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "1025852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8290" }, { "name": "DSA-2290", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2290" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2011-2522" }, { "name": "45393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45488" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "17577", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/17577" }, { "name": "8317", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8317" }, { "name": "JVN#29529126", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN29529126/index.html" }, { "name": "USN-1182-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "48899", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48899" }, { "name": "samba-swat-csrf(68843)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68843" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-12T17:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2011:121", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "74071", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/74071" }, { "name": "HPSBNS02701", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100664", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "HPSBUX02768", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "1025852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=8290" }, { "name": "DSA-2290", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2290" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2011-2522" }, { "name": "45393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45488" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "SSRT100598", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "17577", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/17577" }, { "name": "8317", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8317" }, { "name": "JVN#29529126", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN29529126/index.html" }, { "name": "USN-1182-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "48899", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48899" }, { "name": "samba-swat-csrf(68843)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68843" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2522", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2011:121", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121" }, { "name": "74071", "refsource": "OSVDB", "url": "http://osvdb.org/74071" }, { "name": "HPSBNS02701", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "SSRT100664", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "HPSBUX02768", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2" }, { "name": "1025852", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025852" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=8290", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=8290" }, { "name": "DSA-2290", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2290" }, { "name": "http://www.samba.org/samba/security/CVE-2011-2522", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CVE-2011-2522" }, { "name": "45393", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45393" }, { "name": "45496", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45496" }, { "name": "45488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45488" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=721348", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348" }, { "name": "http://samba.org/samba/history/samba-3.5.10.html", "refsource": "CONFIRM", "url": "http://samba.org/samba/history/samba-3.5.10.html" }, { "name": "SSRT100598", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543" }, { "name": "17577", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/17577" }, { "name": "8317", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8317" }, { "name": "JVN#29529126", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN29529126/index.html" }, { "name": "USN-1182-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-1182-1" }, { "name": "48899", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48899" }, { "name": "samba-swat-csrf(68843)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68843" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2522", "datePublished": "2011-07-29T20:00:00", "dateReserved": "2011-06-15T00:00:00", "dateUpdated": "2024-08-06T23:00:34.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32745
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2022-32745.html | ||
https://security.gentoo.org/glsa/202309-06 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:45.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2022-32745.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to samba 4.16.4, samba 4.15.9, samba 4.14.14" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "(CWE-125|CWE-457)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:43.077565", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.samba.org/samba/security/CVE-2022-32745.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-32745", "datePublished": "2022-08-25T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:45.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5370
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2015-5370.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2015-5370.html" }, { "name": "openSUSE-SU-2016:1025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "SUSE-SU-2016:1022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "SUSE-SU-2016:1028", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" }, { "name": "RHSA-2016:0613", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "openSUSE-SU-2016:1064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0624", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "SUSE-SU-2016:1024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" }, { "name": "SUSE-SU-2016:1023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "https://www.samba.org/samba/security/CVE-2015-5370.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2015-5370.html" }, { "name": "openSUSE-SU-2016:1025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "RHSA-2016:0611", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "RHSA-2016:0619", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5370", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2015-07-06T00:00:00", "dateUpdated": "2024-08-06T06:41:09.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0686
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:27.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "CLA-2004:851", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "SUSE-SA:2004:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "MDKSA-2004:071", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "FLSA:2102", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109785827607823\u0026w=2" }, { "name": "samba-mangling-method-bo(16786)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16786" }, { "name": "SSRT4782", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109094272328981\u0026w=2" }, { "name": "GLSA-200407-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "57664", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "oval:org.mitre.oval:def:10461", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10461" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the \"mangling method = hash\" option is enabled in smb.conf, has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "CLA-2004:851", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "SUSE-SA:2004:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "MDKSA-2004:071", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "FLSA:2102", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://marc.info/?l=bugtraq\u0026m=109785827607823\u0026w=2" }, { "name": "samba-mangling-method-bo(16786)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16786" }, { "name": "SSRT4782", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=109094272328981\u0026w=2" }, { "name": "GLSA-200407-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "57664", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "oval:org.mitre.oval:def:10461", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10461" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0686", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the \"mangling method = hash\" option is enabled in smb.conf, has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2004-0039", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "CLA-2004:851", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000851" }, { "name": "RHSA-2004:259", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-259.html" }, { "name": "20040722 TSSA-2004-014 - samba", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109052891507263\u0026w=2" }, { "name": "CLA-2004:854", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000854" }, { "name": "20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051533021376\u0026w=2" }, { "name": "SUSE-SA:2004:022", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_22_samba.html" }, { "name": "20040722 Security Release - Samba 3.0.5 and 2.2.10", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051340810458\u0026w=2" }, { "name": "MDKSA-2004:071", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071" }, { "name": "FLSA:2102", "refsource": "FEDORA", "url": "http://marc.info/?l=bugtraq\u0026m=109785827607823\u0026w=2" }, { "name": "samba-mangling-method-bo(16786)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16786" }, { "name": "SSRT4782", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=109094272328981\u0026w=2" }, { "name": "GLSA-200407-21", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml" }, { "name": "57664", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1" }, { "name": "101584", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1" }, { "name": "oval:org.mitre.oval:def:10461", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10461" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0686", "datePublished": "2004-07-23T04:00:00", "dateReserved": "2004-07-13T00:00:00", "dateUpdated": "2024-08-08T00:24:27.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0186
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=107657505718743&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/3916 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15131 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=107636290906296&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.debian.org/security/2004/dsa-463 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/9619 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040211 Re: Samba 3.x + kernel 2.6.x local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107657505718743\u0026w=2" }, { "name": "3916", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3916" }, { "name": "samba-smbmnt-gain-privileges(15131)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15131" }, { "name": "20040209 Samba 3.x + kernel 2.6.x local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107636290906296\u0026w=2" }, { "name": "DSA-463", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-463" }, { "name": "9619", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9619" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040211 Re: Samba 3.x + kernel 2.6.x local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107657505718743\u0026w=2" }, { "name": "3916", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3916" }, { "name": "samba-smbmnt-gain-privileges(15131)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15131" }, { "name": "20040209 Samba 3.x + kernel 2.6.x local root vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107636290906296\u0026w=2" }, { "name": "DSA-463", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-463" }, { "name": "9619", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9619" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040211 Re: Samba 3.x + kernel 2.6.x local root vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107657505718743\u0026w=2" }, { "name": "3916", "refsource": "OSVDB", "url": "http://www.osvdb.org/3916" }, { "name": "samba-smbmnt-gain-privileges(15131)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15131" }, { "name": "20040209 Samba 3.x + kernel 2.6.x local root vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107636290906296\u0026w=2" }, { "name": "DSA-463", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-463" }, { "name": "9619", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9619" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0186", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2004-03-02T00:00:00", "dateUpdated": "2024-08-08T00:10:03.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1162
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:44:08.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2001-062", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3" }, { "name": "HPSBUX0107-157", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/3423" }, { "name": "DSA-065", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-065" }, { "name": "2928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/whatsnew/macroexploit.html" }, { "name": "CSSA-2001-024.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt" }, { "name": "IMNX-2001-70-027-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01" }, { "name": "RHSA-2001:086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-086.html" }, { "name": "samba-netbios-file-creation(6731)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6731" }, { "name": "20010623 smbd remote file creation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/193027" }, { "name": "CLA-2001:405", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000405" }, { "name": "L-105", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/l-105.shtml" }, { "name": "20011002-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-22T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2001-062", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3" }, { "name": "HPSBUX0107-157", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/advisories/3423" }, { "name": "DSA-065", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-065" }, { "name": "2928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/whatsnew/macroexploit.html" }, { "name": "CSSA-2001-024.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt" }, { "name": "IMNX-2001-70-027-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01" }, { "name": "RHSA-2001:086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-086.html" }, { "name": "samba-netbios-file-creation(6731)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6731" }, { "name": "20010623 smbd remote file creation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/193027" }, { "name": "CLA-2001:405", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000405" }, { "name": "L-105", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/l-105.shtml" }, { "name": "20011002-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2001-062", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3" }, { "name": "HPSBUX0107-157", "refsource": "HP", "url": "http://www.securityfocus.com/advisories/3423" }, { "name": "DSA-065", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-065" }, { "name": "2928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2928" }, { "name": "http://us1.samba.org/samba/whatsnew/macroexploit.html", "refsource": "CONFIRM", "url": "http://us1.samba.org/samba/whatsnew/macroexploit.html" }, { "name": "CSSA-2001-024.0", "refsource": "CALDERA", "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt" }, { "name": "IMNX-2001-70-027-01", "refsource": "IMMUNIX", "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01" }, { "name": "RHSA-2001:086", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-086.html" }, { "name": "samba-netbios-file-creation(6731)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6731" }, { "name": "20010623 smbd remote file creation vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/193027" }, { "name": "CLA-2001:405", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000405" }, { "name": "L-105", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/l-105.shtml" }, { "name": "20011002-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1162", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T04:44:08.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25722
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2020-25722.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "samba 4.15.2, samba 4.14.10, samba 4.13.14" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:41.461626", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764" }, { "url": "https://www.samba.org/samba/security/CVE-2020-25722.html" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25722", "datePublished": "2022-02-18T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-2114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "86011", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/86011" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2016-2114.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"server signing = mandatory\" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T21:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-106-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "RHSA-2016:0612", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "86011", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/86011" }, { "tags": [ "x_refsource_MISC" ], "url": "http://badlock.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2016-2114.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "USN-2950-5", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "RHSA-2016:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "USN-2950-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2950-4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"server signing = mandatory\" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-106-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012" }, { "name": "RHSA-2016:0612", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html" }, { "name": "USN-2950-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-1" }, { "name": "86011", "refsource": "BID", "url": "http://www.securityfocus.com/bid/86011" }, { "name": "http://badlock.org/", "refsource": "MISC", "url": "http://badlock.org/" }, { "name": "https://www.samba.org/samba/security/CVE-2016-2114.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2016-2114.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "USN-2950-5", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-5" }, { "name": "https://www.samba.org/samba/history/samba-4.2.10.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/history/samba-4.2.10.html" }, { "name": "FEDORA-2016-be53260726", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html" }, { "name": "RHSA-2016:0618", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html" }, { "name": "https://www.samba.org/samba/latest_news.html#4.4.2", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/latest_news.html#4.4.2" }, { "name": "1035533", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035533" }, { "name": "FEDORA-2016-48b3761baa", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html" }, { "name": "RHSA-2016:0614", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html" }, { "name": "RHSA-2016:0620", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html" }, { "name": "openSUSE-SU-2016:1106", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa122", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa122" }, { "name": "USN-2950-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-3" }, { "name": "FEDORA-2016-383fce04e2", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html" }, { "name": "openSUSE-SU-2016:1107", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" }, { "name": "GLSA-201612-47", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-47" }, { "name": "DSA-3548", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3548" }, { "name": "USN-2950-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-2" }, { "name": "USN-2950-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2950-4" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2114", "datePublished": "2016-04-25T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2546
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/17139 | vdb-entry, x_refsource_XF | |
http://www.samba.org/samba/history/samba-3.0.6.html | x_refsource_CONFIRM | |
http://www.trustix.org/errata/2004/0043 | vendor-advisory, x_refsource_TRUSTIX |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:14.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "samba-memory-information-disclosure(17139)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17139" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/history/samba-3.0.6.html" }, { "name": "2004-0043", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0043" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "samba-memory-information-disclosure(17139)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17139" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/history/samba-3.0.6.html" }, { "name": "2004-0043", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0043" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2546", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "samba-memory-information-disclosure(17139)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17139" }, { "name": "http://www.samba.org/samba/history/samba-3.0.6.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/history/samba-3.0.6.html" }, { "name": "2004-0043", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0043" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2546", "datePublished": "2005-11-21T11:00:00", "dateReserved": "2005-11-21T00:00:00", "dateUpdated": "2024-08-08T01:29:14.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0812
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:48:38.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T08:00:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0812", "datePublished": "2000-01-04T05:00:00", "dateReserved": "1999-11-25T00:00:00", "dateUpdated": "2024-08-01T16:48:38.080Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0454
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#649732", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/649732" }, { "name": "24046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24046" }, { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24101" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "GLSA-200702-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "1017588", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017588" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "name": "24021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24021" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0454.html" }, { "name": "24067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24067" }, { "name": "33101", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33101" }, { "name": "24145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24145" }, { "name": "24060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24060" }, { "name": "MDKSA-2007:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459179/100/0/threaded" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "USN-419-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-419-1" }, { "name": "samba-afsacl-format-string(32304)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304" }, { "name": "22403", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22403" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "DSA-1257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1257" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "VU#649732", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/649732" }, { "name": "24046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24046" }, { "name": "24101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24101" }, { "name": "20070207 rPSA-2007-0026-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded" }, { "name": "GLSA-200702-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml" }, { "name": "OpenPKG-SA-2007.012", "tags": [ "vendor-advisory", "x_refsource_OPENPKG" ], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html" }, { "name": "1017588", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017588" }, { "name": "24151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24151" }, { "name": "ADV-2007-0483", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0483" }, { "name": "24021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24021" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1005" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://us1.samba.org/samba/security/CVE-2007-0454.html" }, { "name": "24067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24067" }, { "name": "33101", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33101" }, { "name": "24145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24145" }, { "name": "24060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24060" }, { "name": "MDKSA-2007:034", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034" }, { "name": "20070205 [SAMBA-SECURITY] CVE-2007-0454: Format string bug in afsacl.so VFS plugin", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459179/100/0/threaded" }, { "name": "2007-0007", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0007" }, { "name": "USN-419-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-419-1" }, { "name": "samba-afsacl-format-string(32304)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304" }, { "name": "22403", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22403" }, { "name": "SSA:2007-038-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916" }, { "name": "DSA-1257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1257" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-0454", "datePublished": "2007-02-06T02:00:00", "dateReserved": "2007-01-23T00:00:00", "dateUpdated": "2024-08-07T12:19:30.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2196
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.samba.org/archive/samba-technical/2002-June/022075.html | mailing-list, x_refsource_MLIST | |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc | vendor-advisory, x_refsource_FREEBSD | |
http://www.iss.net/security_center/static/10010.php | vdb-entry, x_refsource_XF | |
http://rhn.redhat.com/errata/RHBA-2002-209.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/5587 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:51:17.770Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[samba-technical] 20020613 struct enum_csc_policy isn\u0027t terminated", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.samba.org/archive/samba-technical/2002-June/022075.html" }, { "name": "FreeBSD-SN-02:05", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc" }, { "name": "samba-memory-structure-bo(10010)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10010.php" }, { "name": "RHBA-2002:209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHBA-2002-209.html" }, { "name": "5587", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5587" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-03-31T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[samba-technical] 20020613 struct enum_csc_policy isn\u0027t terminated", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.samba.org/archive/samba-technical/2002-June/022075.html" }, { "name": "FreeBSD-SN-02:05", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc" }, { "name": "samba-memory-structure-bo(10010)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10010.php" }, { "name": "RHBA-2002:209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHBA-2002-209.html" }, { "name": "5587", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5587" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[samba-technical] 20020613 struct enum_csc_policy isn\u0027t terminated", "refsource": "MLIST", "url": "http://lists.samba.org/archive/samba-technical/2002-June/022075.html" }, { "name": "FreeBSD-SN-02:05", "refsource": "FREEBSD", "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc" }, { "name": "samba-memory-structure-bo(10010)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10010.php" }, { "name": "RHBA-2002:209", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHBA-2002-209.html" }, { "name": "5587", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5587" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2196", "datePublished": "2005-11-16T21:17:00", "dateReserved": "2005-11-16T00:00:00", "dateUpdated": "2024-08-08T03:51:17.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14861
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2019-14861", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-25T15:36:30.362174Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T15:37:11.263Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-4217-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4217-1/" }, { "name": "USN-4217-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4217-2/" }, { "name": "FEDORA-2019-be98a08835", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "name": "openSUSE-SU-2019:2700", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "name": "FEDORA-2019-11dddb785b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "tags": [ "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2019-14861.html" }, { "tags": [ "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[oss-security] 20240625 Re: Out-of-bounds read \u0026 write in the glibc\u0027s qsort()", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "all versions 4.11.x before 4.11.3" }, { "status": "affected", "version": "all versions 4.10.x before 4.10.11" }, { "status": "affected", "version": "all versions 4.x.x before 4.9.17" } ] } ], "descriptions": [ { "lang": "en", "value": "All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T01:05:54.054469", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-4217-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4217-1/" }, { "name": "USN-4217-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4217-2/" }, { "name": "FEDORA-2019-be98a08835", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "name": "openSUSE-SU-2019:2700", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "name": "FEDORA-2019-11dddb785b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202003-52" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861" }, { "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "url": "https://www.samba.org/samba/security/CVE-2019-14861.html" }, { "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "name": "[debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "name": "[oss-security] 20240625 Re: Out-of-bounds read \u0026 write in the glibc\u0027s qsort()", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-14861", "datePublished": "2019-12-10T22:19:05", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0787
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:59:39.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38286", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38286" }, { "name": "ADV-2010-1062", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "FEDORA-2010-1218", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html" }, { "name": "38308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38308" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558833" }, { "name": "GLSA-201206-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "FEDORA-2010-1190", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html" }, { "name": "39898", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5" }, { "name": "USN-893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-893-1" }, { "name": "MDVSA-2010:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532940" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "37992", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37992" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80" }, { "name": "38357", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38357" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=6853" }, { "name": "sambaclient-mountcifs-symlink(55944)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55944" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "38286", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38286" }, { "name": "ADV-2010-1062", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "FEDORA-2010-1218", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html" }, { "name": "38308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38308" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558833" }, { "name": "GLSA-201206-29", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "FEDORA-2010-1190", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html" }, { "name": "39898", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5" }, { "name": "USN-893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-893-1" }, { "name": "MDVSA-2010:090", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532940" }, { "name": "SUSE-SR:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "37992", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37992" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80" }, { "name": "38357", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38357" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=6853" }, { "name": "sambaclient-mountcifs-symlink(55944)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55944" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38286", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38286" }, { "name": "ADV-2010-1062", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1062" }, { "name": "FEDORA-2010-1218", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html" }, { "name": "38308", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38308" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=558833", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558833" }, { "name": "GLSA-201206-29", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml" }, { "name": "FEDORA-2010-1190", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html" }, { "name": "39898", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39898" }, { "name": "http://git.samba.org/?p=samba.git;a=commit;h=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5", "refsource": "CONFIRM", "url": "http://git.samba.org/?p=samba.git;a=commit;h=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5" }, { "name": "USN-893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-893-1" }, { "name": "MDVSA-2010:090", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=532940", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532940" }, { "name": "SUSE-SR:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "name": "37992", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37992" }, { "name": "http://git.samba.org/?p=samba.git;a=commit;h=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80", "refsource": "CONFIRM", "url": "http://git.samba.org/?p=samba.git;a=commit;h=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80" }, { "name": "38357", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38357" }, { "name": "https://bugzilla.samba.org/show_bug.cgi?id=6853", "refsource": "CONFIRM", "url": "https://bugzilla.samba.org/show_bug.cgi?id=6853" }, { "name": "sambaclient-mountcifs-symlink(55944)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55944" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0787", "datePublished": "2010-03-02T18:00:00", "dateReserved": "2010-03-02T00:00:00", "dateUpdated": "2024-08-07T00:59:39.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1615
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:10:03.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15103" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.com/samba-team/samba/-/merge_requests/2644" }, { "name": "FEDORA-2022-4555909843", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202309-06" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Samba", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Samba 4.1 and newer" } ] } ], "descriptions": [ { "lang": "en", "value": "In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-17T08:06:11.330787", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://bugzilla.samba.org/show_bug.cgi?id=15103" }, { "url": "https://gitlab.com/samba-team/samba/-/merge_requests/2644" }, { "name": "FEDORA-2022-4555909843", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/" }, { "name": "GLSA-202309-06", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202309-06" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-1615", "datePublished": "2022-09-01T00:00:00", "dateReserved": "2022-05-06T00:00:00", "dateUpdated": "2024-08-03T00:10:03.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0182
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ciac.org/ciac/bulletins/h-110.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:57.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "H-110", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/h-110.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "H-110", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/h-110.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "H-110", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/h-110.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0182", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:57.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0022
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch" }, { "name": "MDVSA-2009:042", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:042" }, { "name": "33392", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33392" }, { "name": "samba-file-system-security-bypass(47733)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47733" }, { "name": "1021513", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021513" }, { "name": "FEDORA-2009-0268", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html" }, { "name": "33118", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33118" }, { "name": "USN-702-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/702-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2009-0022.html" }, { "name": "51152", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/51152" }, { "name": "33379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33379" }, { "name": "33431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33431" }, { "name": "ADV-2009-0017", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch" }, { "name": "MDVSA-2009:042", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:042" }, { "name": "33392", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33392" }, { "name": "samba-file-system-security-bypass(47733)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47733" }, { "name": "1021513", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021513" }, { "name": "FEDORA-2009-0268", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html" }, { "name": "33118", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33118" }, { "name": "USN-702-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/702-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2009-0022.html" }, { "name": "51152", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/51152" }, { "name": "33379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33379" }, { "name": "33431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33431" }, { "name": "ADV-2009-0017", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0017" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-0022", "datePublished": "2009-01-05T20:00:00", "dateReserved": "2008-12-15T00:00:00", "dateUpdated": "2024-08-07T04:17:10.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2619
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2778 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2017/dsa-3816 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/97033 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/41740/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securitytracker.com/id/1038117 | vdb-entry, x_refsource_SECTRACK | |
https://access.redhat.com/errata/RHSA-2017:2338 | vendor-advisory, x_refsource_REDHAT | |
https://www.samba.org/samba/security/CVE-2017-2619.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1429472 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2017:1265 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2017:2789 | vendor-advisory, x_refsource_REDHAT | |
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:2778", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "DSA-3816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3816" }, { "name": "97033", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97033" }, { "name": "41740", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41740/" }, { "name": "1038117", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038117" }, { "name": "RHSA-2017:2338", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-2619.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.5.7" }, { "status": "affected", "version": "4.4.11" } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-13T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2017:2778", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "DSA-3816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3816" }, { "name": "97033", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97033" }, { "name": "41740", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41740/" }, { "name": "1038117", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038117" }, { "name": "RHSA-2017:2338", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-2619.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472" }, { "name": "RHSA-2017:1265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-03-27T00:00:00", "ID": "CVE-2017-2619", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.6.1" }, { "version_value": "4.5.7" }, { "version_value": "4.4.11" } ] } } ] }, "vendor_name": "Samba" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:2778", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2778" }, { "name": "DSA-3816", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3816" }, { "name": "97033", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97033" }, { "name": "41740", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41740/" }, { "name": "1038117", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038117" }, { "name": "RHSA-2017:2338", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2338" }, { "name": "https://www.samba.org/samba/security/CVE-2017-2619.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-2619.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429472" }, { "name": "RHSA-2017:1265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1265" }, { "name": "RHSA-2017:2789", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-2619", "datePublished": "2018-03-12T15:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T00:45:45.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3403
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-314-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-314-1" }, { "name": "21187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21187" }, { "name": "ADV-2006-4750", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SUSE-SR:2006:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html" }, { "name": "1016459", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016459" }, { "name": "20983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20983" }, { "name": "ADV-2006-2745", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2745" }, { "name": "ADV-2006-4502", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4502" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CAN-2006-3403.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "22875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22875" }, { "name": "SSA:2006-195", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.416876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html" }, { "name": "21190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21190" }, { "name": "21086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21086" }, { "name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21262" }, { "name": "20060711 rPSA-2006-0128-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/439880/100/100/threaded" }, { "name": "20060710 Re: [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/439875/100/0/threaded" }, { "name": "VU#313836", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/313836" }, { "name": "23155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23155" }, { "name": "18927", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18927" }, { "name": "samba-smbd-connection-dos(27648)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27648" }, { "name": "21019", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21019" }, { "name": "20980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20980" }, { "name": "20060721 Re: Samba Internal Data Structures DOS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440836/100/0/threaded" }, { "name": "RHSA-2006:0591", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0591.html" }, { "name": "APPLE-SA-2006-11-28", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "HPSBUX02155", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "TA06-333A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded" }, { "name": "21046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21046" }, { "name": "21159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21159" }, { "name": "SSRT061235", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "20060720 Samba Internal Data Structures DOS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440767/100/0/threaded" }, { "name": "DSA-1110", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1110" }, { "name": "20060710 [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/439757/100/0/threaded" }, { "name": "GLSA-200607-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200607-10.xml" }, { "name": "oval:org.mitre.oval:def:11355", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355" }, { "name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded" }, { "name": "MDKSA-2006:120", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:120" }, { "name": "21143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21143" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "21018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21018" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-314-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-314-1" }, { "name": "21187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21187" }, { "name": "ADV-2006-4750", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SUSE-SR:2006:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html" }, { "name": "1016459", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016459" }, { "name": "20983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20983" }, { "name": "ADV-2006-2745", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2745" }, { "name": "ADV-2006-4502", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4502" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CAN-2006-3403.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "22875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22875" }, { "name": "SSA:2006-195", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.416876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html" }, { "name": "21190", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21190" }, { "name": "21086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21086" }, { "name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html" }, { "name": "21262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21262" }, { "name": "20060711 rPSA-2006-0128-1 samba samba-swat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/439880/100/100/threaded" }, { "name": "20060710 Re: [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/439875/100/0/threaded" }, { "name": "VU#313836", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/313836" }, { "name": "23155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23155" }, { "name": "18927", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18927" }, { "name": "samba-smbd-connection-dos(27648)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27648" }, { "name": "21019", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21019" }, { "name": "20980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20980" }, { "name": "20060721 Re: Samba Internal Data Structures DOS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440836/100/0/threaded" }, { "name": "RHSA-2006:0591", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0591.html" }, { "name": "APPLE-SA-2006-11-28", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "HPSBUX02155", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "TA06-333A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded" }, { "name": "21046", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21046" }, { "name": "21159", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21159" }, { "name": "SSRT061235", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "20060720 Samba Internal Data Structures DOS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440767/100/0/threaded" }, { "name": "DSA-1110", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1110" }, { "name": "20060710 [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/439757/100/0/threaded" }, { "name": "GLSA-200607-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200607-10.xml" }, { "name": "oval:org.mitre.oval:def:11355", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355" }, { "name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded" }, { "name": "MDKSA-2006:120", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:120" }, { "name": "21143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21143" }, { "name": "20060703-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "21018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21018" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3403", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-314-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-314-1" }, { "name": "21187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21187" }, { "name": "ADV-2006-4750", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4750" }, { "name": "SUSE-SR:2006:017", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html" }, { "name": "1016459", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016459" }, { "name": "20983", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20983" }, { "name": "ADV-2006-2745", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2745" }, { "name": "ADV-2006-4502", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4502" }, { "name": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html", "refsource": "MISC", "url": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html" }, { "name": "http://www.samba.org/samba/security/CAN-2006-3403.html", "refsource": "CONFIRM", "url": "http://www.samba.org/samba/security/CAN-2006-3403.html" }, { "name": "http://docs.info.apple.com/article.html?artnum=304829", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=304829" }, { "name": "22875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22875" }, { "name": "SSA:2006-195", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.416876" }, { "name": "http://www.vmware.com/download/esx/esx-202-200610-patch.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html" }, { "name": "21190", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21190" }, { "name": "21086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21086" }, { "name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded" }, { "name": "http://www.vmware.com/download/esx/esx-213-200610-patch.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html" }, { "name": "21262", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21262" }, { "name": "20060711 rPSA-2006-0128-1 samba samba-swat", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/439880/100/100/threaded" }, { "name": "20060710 Re: [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/439875/100/0/threaded" }, { "name": "VU#313836", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/313836" }, { "name": "23155", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23155" }, { "name": "18927", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18927" }, { "name": "samba-smbd-connection-dos(27648)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27648" }, { "name": "21019", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21019" }, { "name": "20980", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20980" }, { "name": "20060721 Re: Samba Internal Data Structures DOS Vulnerability Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440836/100/0/threaded" }, { "name": "RHSA-2006:0591", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0591.html" }, { "name": "APPLE-SA-2006-11-28", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html" }, { "name": "HPSBUX02155", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "TA06-333A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html" }, { "name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded" }, { "name": "21046", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21046" }, { "name": "21159", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21159" }, { "name": "SSRT061235", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded" }, { "name": "20060720 Samba Internal Data Structures DOS Vulnerability Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440767/100/0/threaded" }, { "name": "DSA-1110", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1110" }, { "name": "20060710 [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/439757/100/0/threaded" }, { "name": "GLSA-200607-10", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200607-10.xml" }, { "name": "oval:org.mitre.oval:def:11355", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355" }, { "name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded" }, { "name": "MDKSA-2006:120", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:120" }, { "name": "21143", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21143" }, { "name": "20060703-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc" }, { "name": "21018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21018" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3403", "datePublished": "2006-07-12T19:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12150
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:16.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150" }, { "name": "100918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100918" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2017-12150.html" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039401" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "RHSA-2017:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2791" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "Samba", "versions": [ { "status": "affected", "version": "4.6.8" }, { "status": "affected", "version": "4.5.14" }, { "status": "affected", "version": "4.4.16" }, { "status": "affected", "version": "4.7.0" } ] } ], "datePublic": "2017-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce \"SMB signing\" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-300", "description": "CWE-300", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-30T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150" }, { "name": "100918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100918" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2017-12150.html" }, { "name": "DSA-3983", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039401" }, { "name": "RHSA-2017:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "RHSA-2017:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2791" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-12150", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.6.8" }, { "version_value": "4.5.14" }, { "version_value": "4.4.16" }, { "version_value": "4.7.0" } ] } } ] }, "vendor_name": "Samba" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce \"SMB signing\" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-300" } ] } ] }, "references": { "reference_data": [ { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03775en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20170921-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170921-0001/" }, { "name": "RHSA-2017:2790", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2790" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150" }, { "name": "100918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100918" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us" }, { "name": "https://www.samba.org/samba/security/CVE-2017-12150.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2017-12150.html" }, { "name": "DSA-3983", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3983" }, { "name": "RHSA-2017:2858", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2858" }, { "name": "1039401", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039401" }, { "name": "RHSA-2017:2789", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2789" }, { "name": "RHSA-2017:2791", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2791" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-12150", "datePublished": "2018-07-26T18:00:00", "dateReserved": "2017-08-01T00:00:00", "dateUpdated": "2024-08-05T18:28:16.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10918
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.samba.org/samba/security/CVE-2018-10918.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3738-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://security.netapp.com/advisory/ntap-20180814-0001/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105083 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/202003-52 | vendor-advisory, x_refsource_GENTOO |
▼ | Vendor | Product |
---|---|---|
The Samba Team | samba |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:35.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.samba.org/samba/security/CVE-2018-10918.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105083", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105083" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "samba", "vendor": "The Samba Team", "versions": [ { "status": "affected", "version": "4.7.9" }, { "status": "affected", "version": "4.8.4" } ] } ], "datePublic": "2018-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-25T18:06:07", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.samba.org/samba/security/CVE-2018-10918.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918" }, { "name": "USN-3738-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3738-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105083", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105083" }, { "name": "GLSA-202003-52", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "4.7.9" }, { "version_value": "4.8.4" } ] } } ] }, "vendor_name": "The Samba Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.2/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.samba.org/samba/security/CVE-2018-10918.html", "refsource": "CONFIRM", "url": "https://www.samba.org/samba/security/CVE-2018-10918.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918" }, { "name": "USN-3738-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3738-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20180814-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180814-0001/" }, { "name": "105083", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105083" }, { "name": "GLSA-202003-52", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-52" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10918", "datePublished": "2018-08-22T17:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:54:35.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0939
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5444 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:31.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-url-filename-dos(5444)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5444" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows remote attackers to cause a denial of service by repeatedly submitting a nonstandard URL in the GET HTTP request and forcing it to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-url-filename-dos(5444)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5444" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows remote attackers to cause a denial of service by repeatedly submitting a nonstandard URL in the GET HTTP request and forcing it to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001030 Samba 2.0.7 SWAT vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html" }, { "name": "samba-swat-url-filename-dos(5444)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5444" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0939", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:31.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0172
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.samba.org/samba/security/CVE-2013-0172 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.samba.org/samba/security/CVE-2013-0172" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-01-17T21:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.samba.org/samba/security/CVE-2013-0172" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0172", "datePublished": "2013-01-17T21:00:00Z", "dateReserved": "2012-12-06T00:00:00Z", "dateUpdated": "2024-08-06T14:18:09.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202001-0521
Vulnerability from variot
There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer. samba Contains a vulnerability involving the use of freed memory.Denial of service (DoS) May be in a state. ========================================================================== Ubuntu Security Notice USN-4244-1 January 21, 2020
samba vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Samba.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-14902)
Robert Święcki discovered that Samba incorrectly handled certain character conversions when the log level is set to 3 or above. (CVE-2019-14907)
Christian Naumer discovered that Samba incorrectly handled DNS zone scavenging. This issue could possibly result in some incorrect data being written to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-19344)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: samba 2:4.10.7+dfsg-0ubuntu2.4
Ubuntu 19.04: samba 2:4.10.0+dfsg-0ubuntu2.8
Ubuntu 18.04 LTS: samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.15
Ubuntu 16.04 LTS: samba 2:4.3.11+dfsg-0ubuntu0.16.04.25
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4244-1 CVE-2019-14902, CVE-2019-14907, CVE-2019-19344
Package Information: https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.4 https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.8 https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.15 https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.25 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-52
https://security.gentoo.org/
Severity: Normal Title: Samba: Multiple vulnerabilities Date: March 25, 2020 Bugs: #664316, #672140, #686036, #693558, #702928, #706144 ID: 202003-52
Synopsis
Multiple vulnerabilities have been found in Samba, the worst of which could lead to remote code execution.
Background
Samba is a suite of SMB and CIFS client/server programs.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-fs/samba < 4.11.6 >= 4.9.18 >= 4.10.13 *>= 4.11.6
Description
Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could possibly execute arbitrary code, cause a Denial of Service condition, conduct a man-in-the-middle attack, or obtain sensitive information.
Workaround
There is no known workaround at this time.
Resolution
All Samba 4.9.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.9.18"
All Samba 4.10.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.10.13"
All Samba 4.11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.11.6"
References
[ 1 ] CVE-2018-10858 https://nvd.nist.gov/vuln/detail/CVE-2018-10858 [ 2 ] CVE-2018-10918 https://nvd.nist.gov/vuln/detail/CVE-2018-10918 [ 3 ] CVE-2018-10919 https://nvd.nist.gov/vuln/detail/CVE-2018-10919 [ 4 ] CVE-2018-1139 https://nvd.nist.gov/vuln/detail/CVE-2018-1139 [ 5 ] CVE-2018-1140 https://nvd.nist.gov/vuln/detail/CVE-2018-1140 [ 6 ] CVE-2018-14629 https://nvd.nist.gov/vuln/detail/CVE-2018-14629 [ 7 ] CVE-2018-16841 https://nvd.nist.gov/vuln/detail/CVE-2018-16841 [ 8 ] CVE-2018-16851 https://nvd.nist.gov/vuln/detail/CVE-2018-16851 [ 9 ] CVE-2018-16852 https://nvd.nist.gov/vuln/detail/CVE-2018-16852 [ 10 ] CVE-2018-16853 https://nvd.nist.gov/vuln/detail/CVE-2018-16853 [ 11 ] CVE-2018-16857 https://nvd.nist.gov/vuln/detail/CVE-2018-16857 [ 12 ] CVE-2018-16860 https://nvd.nist.gov/vuln/detail/CVE-2018-16860 [ 13 ] CVE-2019-10197 https://nvd.nist.gov/vuln/detail/CVE-2019-10197 [ 14 ] CVE-2019-14861 https://nvd.nist.gov/vuln/detail/CVE-2019-14861 [ 15 ] CVE-2019-14870 https://nvd.nist.gov/vuln/detail/CVE-2019-14870 [ 16 ] CVE-2019-14902 https://nvd.nist.gov/vuln/detail/CVE-2019-14902 [ 17 ] CVE-2019-14907 https://nvd.nist.gov/vuln/detail/CVE-2019-14907 [ 18 ] CVE-2019-19344 https://nvd.nist.gov/vuln/detail/CVE-2019-19344
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202003-52
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0521", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "skynas", "scope": "eq", "trust": 1.8, "vendor": "synology", "version": null }, { "model": "directory server", "scope": "eq", "trust": 1.8, "vendor": "synology", "version": null }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.9.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.10.12" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "router manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "1.2" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.9.18" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.10.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.10" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.04" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.11.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.11.5" }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.11.x" }, { "model": "diskstation manager", "scope": "eq", "trust": 0.8, "vendor": "synology", "version": null }, { "model": "leap", "scope": "eq", "trust": 0.8, "vendor": "opensuse", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "project" }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.11.5" }, { "model": "router manager", "scope": "eq", "trust": 0.8, "vendor": "synology", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.10.12" }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.9.18" }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.10.x" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.9.x" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "NVD", "id": "CVE-2019-19344" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.18", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.12", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.11.5", "versionStartIncluding": "4.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-19344" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,Gentoo", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-905" } ], "trust": 0.6 }, "cve": "CVE-2019-19344", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-19344", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-151781", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-19344", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-19344", "trust": 1.8, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2019-19344", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202001-905", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-151781", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-151781" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer. samba Contains a vulnerability involving the use of freed memory.Denial of service (DoS) May be in a state. ==========================================================================\nUbuntu Security Notice USN-4244-1\nJanuary 21, 2020\n\nsamba vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Samba. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nIt was discovered that Samba did not automatically replicate ACLs set to\ninherit down a subtree on AD Directory, contrary to expectations. This\nissue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-14902)\n\nRobert \u015awi\u0119cki discovered that Samba incorrectly handled certain character\nconversions when the log level is set to 3 or above. (CVE-2019-14907)\n\nChristian Naumer discovered that Samba incorrectly handled DNS zone\nscavenging. This issue could possibly result in some incorrect data being\nwritten to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-19344)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n samba 2:4.10.7+dfsg-0ubuntu2.4\n\nUbuntu 19.04:\n samba 2:4.10.0+dfsg-0ubuntu2.8\n\nUbuntu 18.04 LTS:\n samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.15\n\nUbuntu 16.04 LTS:\n samba 2:4.3.11+dfsg-0ubuntu0.16.04.25\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://usn.ubuntu.com/4244-1\n CVE-2019-14902, CVE-2019-14907, CVE-2019-19344\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.4\n https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.8\n https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.15\n https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.25\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202003-52\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Samba: Multiple vulnerabilities\n Date: March 25, 2020\n Bugs: #664316, #672140, #686036, #693558, #702928, #706144\n ID: 202003-52\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Samba, the worst of which\ncould lead to remote code execution. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-fs/samba \u003c 4.11.6 *\u003e= 4.9.18\n *\u003e= 4.10.13\n *\u003e= 4.11.6\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code, cause a Denial\nof Service condition, conduct a man-in-the-middle attack, or obtain\nsensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba 4.9.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.9.18\"\n\nAll Samba 4.10.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.10.13\"\n\nAll Samba 4.11.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.11.6\"\n\nReferences\n==========\n\n[ 1 ] CVE-2018-10858\n https://nvd.nist.gov/vuln/detail/CVE-2018-10858\n[ 2 ] CVE-2018-10918\n https://nvd.nist.gov/vuln/detail/CVE-2018-10918\n[ 3 ] CVE-2018-10919\n https://nvd.nist.gov/vuln/detail/CVE-2018-10919\n[ 4 ] CVE-2018-1139\n https://nvd.nist.gov/vuln/detail/CVE-2018-1139\n[ 5 ] CVE-2018-1140\n https://nvd.nist.gov/vuln/detail/CVE-2018-1140\n[ 6 ] CVE-2018-14629\n https://nvd.nist.gov/vuln/detail/CVE-2018-14629\n[ 7 ] CVE-2018-16841\n https://nvd.nist.gov/vuln/detail/CVE-2018-16841\n[ 8 ] CVE-2018-16851\n https://nvd.nist.gov/vuln/detail/CVE-2018-16851\n[ 9 ] CVE-2018-16852\n https://nvd.nist.gov/vuln/detail/CVE-2018-16852\n[ 10 ] CVE-2018-16853\n https://nvd.nist.gov/vuln/detail/CVE-2018-16853\n[ 11 ] CVE-2018-16857\n https://nvd.nist.gov/vuln/detail/CVE-2018-16857\n[ 12 ] CVE-2018-16860\n https://nvd.nist.gov/vuln/detail/CVE-2018-16860\n[ 13 ] CVE-2019-10197\n https://nvd.nist.gov/vuln/detail/CVE-2019-10197\n[ 14 ] CVE-2019-14861\n https://nvd.nist.gov/vuln/detail/CVE-2019-14861\n[ 15 ] CVE-2019-14870\n https://nvd.nist.gov/vuln/detail/CVE-2019-14870\n[ 16 ] CVE-2019-14902\n https://nvd.nist.gov/vuln/detail/CVE-2019-14902\n[ 17 ] CVE-2019-14907\n https://nvd.nist.gov/vuln/detail/CVE-2019-14907\n[ 18 ] CVE-2019-19344\n https://nvd.nist.gov/vuln/detail/CVE-2019-19344\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202003-52\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "VULHUB", "id": "VHN-151781" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-19344", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2019-014341", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "156018", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156915", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0249", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-905", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-151781", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151781" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "id": "VAR-202001-0521", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-151781" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:43:19.691000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Synology-SA-20", "trust": 0.8, "url": "https://usn.ubuntu.com/4244-1/" }, { "title": "samba Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109220" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Using freed memory (CWE-416) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151781" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "NVD", "id": "CVE-2019-19344" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://security.gentoo.org/glsa/202003-52" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-19344" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "trust": 1.7, "url": "https://www.synology.com/security/advisory/synology_sa_20_01" }, { "trust": 1.7, "url": "https://www.samba.org/samba/security/cve-2019-19344.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/4244-1/" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19344" }, { "trust": 1.0, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200224-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200223-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156018/ubuntu-security-notice-usn-4244-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156915/gentoo-linux-security-advisory-202003-52.html" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2019-19344" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0249/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/samba-three-vulnerabilities-31386" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14902" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14907" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.25" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4244-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16857" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10918" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16860" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10197" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14629" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16851" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10858" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16852" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10919" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1140" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14870" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1139" } ], "sources": [ { "db": "VULHUB", "id": "VHN-151781" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-151781" }, { "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "NVD", "id": "CVE-2019-19344" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-21T00:00:00", "db": "VULHUB", "id": "VHN-151781" }, { "date": "2020-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "date": "2020-01-21T19:09:24", "db": "PACKETSTORM", "id": "156018" }, { "date": "2020-03-26T14:45:19", "db": "PACKETSTORM", "id": "156915" }, { "date": "2020-01-21T18:15:12.937000", "db": "NVD", "id": "CVE-2019-19344" }, { "date": "2020-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-25T00:00:00", "db": "VULHUB", "id": "VHN-151781" }, { "date": "2020-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014341" }, { "date": "2023-11-07T03:07:38.380000", "db": "NVD", "id": "CVE-2019-19344" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-905" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "CNNVD", "id": "CNNVD-202001-905" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "samba\u00a0 Vulnerabilities in use of freed memory", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014341" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-905" } ], "trust": 0.6 } }
var-200909-0782
Vulnerability from variot
Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories. Samba is prone to a vulnerability that may allow attackers to bypass certain security restrictions. Successful exploits may allow attackers to gain access to resources that aren't supposed to be shared. Versions prior to Samba 3.4.2, 3.3.8, 3.2.15, and 3.0.37 are vulnerable. NOTE: This issue was previously covered in BID 36349 (Apple Mac OS X 2009-005 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. This allows local users to partly disclose the content of arbitrary files by specifying the file as credentials file and attempting to mount a samba share (CVE-2009-2948).
A reply to an oplock break notification which samba doesn't expect could lead to the service getting stuck in an infinite loop.
A lack of error handling in case no home diretory was configured/specified for the user could lead to file disclosure.
For the oldstable distribution (etch), this problem will be fixed soon.
For the testing distribution (squeeze), this problem will be fixed soon.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.dsc Size/MD5 checksum: 1830 7cc3718e19bbad5aa7099889c6c503a5 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5.orig.tar.gz Size/MD5 checksum: 50276407 0f7539e09803ae60a2912e70adf1c747 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.diff.gz Size/MD5 checksum: 235342 836141a1924843383cc385e544c933e5
Architecture independent packages:
http://security.debian.org/pool/updates/main/s/samba/samba-doc_3.2.5-4lenny7_all.deb Size/MD5 checksum: 7952438 630b57065388404b8a9fe3e9e111dc47 http://security.debian.org/pool/updates/main/s/samba/samba-doc-pdf_3.2.5-4lenny7_all.deb Size/MD5 checksum: 6252326 cded2ecbaa3fd39bd215dbb4ec666d4c
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 1945142 a6804ba408657cc4c89c80b0d6e4b8a4 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 1078442 0bedbb5cdb5ca36f52d2e1d1a6015804 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 3273896 082fdadedaf0234b97a8aefc1ef62d8a http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 2572542 ed15d1a7aa9c065986a8e896d63479e2 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 4830106 58ed5cd28d4c43d07195d013cf25553f http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 1461944 71adea7a3b47b65f8df4f3dc5efc4422 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 81488 d521efbda414cf6d4a588873442eb987 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 5730522 cca571adc80b833e7d9c45d5dd7fa103 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 637762 b526ea1ed9ca51d132a7685ec8320eea http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 1333234 36e35a3c252fabcfd2ec0ba8407323ca http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 3736262 9dc1a726efda21fa112ef2641c9b1f6a http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_alpha.deb Size/MD5 checksum: 6953202 b3e8de8b127bcd1f5dda4db61ed44b20
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 3274278 b732915df239ea1a9fff196250d6d383 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 1493684 460ed93756df58adfa57870d06c9aaff http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 627686 70379a8e6ce3b5d6de6af6b895d30619 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 3728204 ac7fb1f7d07628d0452d10e62b2d661d http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 1083940 5ca50cf6abd792b51e501f846f782231 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 5646144 09130baf353097710d6df8a6586875d7 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 1953358 e7c3f85d21b94e62baf0bc5849d8a7ed http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 80522 507bc24d176289793eadd28f4623e331 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 1358910 6ec7ccedec85f92e175b99c6abfb76ba http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 1995586 be70b626e522a6d10947717cc4dad784 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 7007462 b3a959d7475adb2d8aefc1d590690744 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_amd64.deb Size/MD5 checksum: 4775388 b2adb39f3d76b691a747126efd40452a
arm architecture (ARM)
http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 561128 0d9cc7d736f2ac3af0037fb0538885bb http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 2398710 a2a88432efcb034fad0cfc36130938f6 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 6177100 b465429510298d684d16f33d977ec1c3 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 3353238 d7e4a1fb9ecb639471baa485dc629653 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 79216 da72ebd5740459cd44c6d5735883f203 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 4267492 62425ac8d76f5879b900622026883d94 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 1315868 8b3019c57cfeeb28509ca96f7d0358fa http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 972222 1197d9bb33cfb181d99f03102b751cbf http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 5041464 6db94424b23399cf83de0ae1968efba0 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 1203924 f8a743cc5f4afb87f8b9cb883252c6f2 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 1817072 72fddd524748b9e9206c135e81c698dc http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_arm.deb Size/MD5 checksum: 2892294 b43b907010b9373ec7957a570d9a80ec
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 2910452 fd7f3ad0731784dccdc5b3b467513469 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 6214560 94dff8a518547e92fb165c02dae9baec http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 5070850 b4a9ac34be34928672ce800c899ac042 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 981922 ae00524832d05f9aa8c06686c9e4e461 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 1323868 be4570e7c8720bf0c756b4eac3cd3fe0 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 3372252 012baecc35e1becc8a07d81adc262d65 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 4294422 0c6add94f7e453817388fa9e529b82bd http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 2424800 db72d33ac4229f163053c1f4ea18480e http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 78816 d0ac45bb3404ac4fa9972bf47ec91cac http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 1823568 48f417418296b035f611572d4504ffbd http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 1210432 d58cf1719fc208e76cec7c28cb594da7 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_armel.deb Size/MD5 checksum: 564066 43f4da7801d6e972fae31ce287ded998
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 2067740 1f3465310bfa420ca5d3dca47fb61876 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 6687014 bd2920b6f871c5cfc573454993b99bd3 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 4653108 91139f0c545ded0f434912e577cc655b http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 1375386 2f9657458e85625ffa4f762df7ca9a87 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 80862 32248cce30e50a58171439955e8c1b31 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 5501106 2c9166906405f03cb05d509b871ee48b http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 3177446 f061d9d8f7e5276ff6f6bf98ecea456e http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 631654 1dd17d4d9edc8fc60707db89643a8aea http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 3610032 ea72fc29881895beab6c09e20dce4eb9 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 1046340 b118ec013c5588b8baaea5d1b0e920a8 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 2229186 b1f09642dd40089211dbaa22d9e234fd http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_hppa.deb Size/MD5 checksum: 1412786 3ffb5d639b595a3af2d1661439f7559d
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 984354 610ff7af9bdec786dc66dfc71e6d906d http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 2930762 16cc9438cc5a7bac68f842aaff01cb44 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 6302570 8508f2837d10ed9e791690764c887482 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 2081416 a97abc97a1ccbebc475cf94ab984fac0 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 561714 b61348ec0f3adb19990550cab9b7e40b http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 3405124 904fba778279f57af680c3a25d316c89 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 4295250 e783fb6625c27e5d4dbdf0b5072345db http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 78984 0a4c138021591e75544c95a70a79f5e4 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 5067188 9b7a2c22ef8ebab7db2da88e77d61607 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 1825116 d70821ed19cb8118f76529c844c967de http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 1199768 f33cfc38a35e53f9a278279d10cb9296 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_i386.deb Size/MD5 checksum: 1349920 a34c0d26610af3d6a5e8c0c9e35f6acf
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 4386438 ec0ed107b01d00462e6a4dd9fa914a6f http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 5832230 d73c656dac14065b3a1f13201510eb20 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 1724092 9b5c69cdc6911c755a8e6b12d048d1ba http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 84004 bc0fe8f98f03b5d665810cb5ade516e9 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 752072 c462e06b2ff50d6abbc6fa5ba6c14dba http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 1561116 91986263af0fd80f2a8d220e626ea4e9 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 8294752 bfea15cf71e6f3503e8601b7b7a51ff4 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 1939328 a3d3f802ed54267a93a61eed49d48b7e http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 2400926 961af2d58aeff2eb54b6316b56b0d71b http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 1280080 63385632efbd6d173e452b75ac295e7d http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 6933470 666a61b68183f3afc017cb3658d25049 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_ia64.deb Size/MD5 checksum: 3915410 a7ae5b73317aff391dbfffe447ee8958
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 2507514 c8d996cba28f6d76d187774f844b01aa http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 4203042 d48c2d45cd762dc2bad73ca9c089d3c9 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 572688 4c689c9090845e6784d96eafdd1d1dd5 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 1205342 92c7d350a6958c60b719dc1bca25e23c http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 3238756 9c2d7e67ffcb7f6f9010e2a4cf3e5e16 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 942044 b994c97405ec4963b68189a0ba00067b http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 4998666 1648dd4cfec7bc14cbd41320b44fbb16 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 2809438 f4ad77583575756d14629fd98c8166f5 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 79288 10a8cdeed703948d1dd5e836897558f1 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 2182258 5183531629f1c99dd71f253832bab233 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 5840974 cb82df1024f5c10770ac98afe89e48a3 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mips.deb Size/MD5 checksum: 1093592 8e55a6342da60f19c3c95a55a1d90164
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 2128338 f27eefe417a4831ed071ee2a34949e47 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 569280 584e1b162cb0452b814d34aa618d9b85 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 79204 69f192c04fa40eb5e2fc37c1cdb1b0ac http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 5801134 d3791aacacfcadd4caf909dd9b62fe31 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 1081720 b19e32963b224825b1f6335e28bc6d6b http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 2792976 e3d2772a8cf2274a26190043d0c9694a http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 2387806 e5f53727f8ccdca5bfb82efbd5601c7e http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 4967334 3dfdbd6e944b31808bb38bbe3ee3fe35 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 1196484 bc9d17cd36558e526efd2e3870f2b0e4 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 3219234 d4615fd079aecae1ed4753c4449aea75 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 4177874 10909deb34148f33c2a92ecb6cfd8c72 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mipsel.deb Size/MD5 checksum: 936880 1e742c0aa5a77a995fa174a9b02913c4
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 2988566 40620c503ca952eeeb73bde777a14435 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 6294542 feab7c9b74b13b06b6977d637623c728 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 2079372 4886a2d8d7664280dae64605c891996b http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 1712666 75b337ef8fb0e52f71cf2e9b18faa1d4 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 3423452 da023922a04344c534ee88e0e0292900 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 5187664 0ddd64379049fadd254da0045e04d307 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 595048 b08157624bc5ebe37b5a2c343649bb83 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 1333642 98613e2a5c876333295cc0aab31ad250 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 989426 e1b15a1a53be2bd09010c1dd0eeddcf8 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 1239864 1aafcfc867e23a3b84f58e29f5a4b163 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 4403350 c2b90fc3fb94dcd324f9da7a38a7c878 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_powerpc.deb Size/MD5 checksum: 80476 3ac690ddd20c773e1437d21572c37a2e
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 2061206 694599e2dae140a04c53be168ebbf163 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 1389672 25b0b8754be83bae0984de459f7cf319 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 641924 989f56ac5c323f74b34512dcf48412a0 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 1935682 032e63baf547b194e2af89da342be617 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 1258028 5884f69e4c3fc4567c8f2392b4cae88d http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 4740858 01348d4fe49f9f8b07eb98b77a447c4d http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 1056846 85573ee68987c713bf2abf1c676bcd6a http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 6706474 c2cd5c961d23f7ec513b2cb0efa469a8 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 5647644 c123e43888dace888b100f4d61cef627 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 80832 c96484d5c2588fb90a23df5869463554 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 3204582 0254ff9259bae547b7d8673124473e19 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_s390.deb Size/MD5 checksum: 3650302 0716bdcda1c0b080e30fbc2b4af03e6b
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 1202198 76ec9e4b183e72139b216321ef0dbc6f http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 975366 ce9edebb6cdbbfce4ed44dc376960d3a http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 4322338 398acf0f34e81b674ec8cf4149bf4534 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 2924672 52a6813bc6e557daa5f2ec523942ebcc http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 5116574 63e4f4faadf3223fdd904e546aab6a22 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 3372416 73b1333d568d87529e8d3072ebd4c509 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 581590 2dcac90d984a7b08083be093befa1472 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 1303976 731b1a1f9a65e1ec887c0fbdfcc867d3 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 1996180 13724133b88e237853164fedd89c356b http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 79152 1ffe88781e928339aa16c594f9f224f0 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 6172106 37c0d2de6d73127751cf1670ee468944 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_sparc.deb Size/MD5 checksum: 2020578 f161d329079cb0df6cbc30ed97191e15
These files will probably be moved into the stable distribution on its next update. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2010-0006 Synopsis: ESX Service Console updates for samba and acpid Issue date: 2010-04-01 Updated on: 2010-04-01 (initial release of advisory) CVE numbers: CVE-2009-2906, CVE-2009-1888, CVE-2009-2813, CVE-2009-2948, CVE-2009-0798
- Summary
ESX Service Console updates for samba and acpid packages.
- Relevant releases
VMware ESX 4.0.0 without patch ESX400-201003405-SG, ESX400-201003403-SG Notes:
Effective May 2010, VMware's patch and update release program during Extended Support will be continued with the condition that all subsequent patch and update releases will be based on the latest baseline release version as of May 2010 (i.e. ESX 3.0.3 Update 1, ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section "End of Product Availability FAQs" at http://www.vmware.com/support/policies/lifecycle/vi/faq.html for details.
Extended support for ESX 2.5.5 ends on 2010-06-15. Users should plan to upgrade to at least ESX 3.0.3 Update 1 and preferably to the newest release available.
Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan to upgrade to at least ESX 3.5 Update 5 and preferably to the newest release available.
- Problem Description
a. Service Console update for samba to 3.0.33-3.15.el5_4.1
This update changes the samba packages to
samba-client-3.0.33-3.15.el5_4.1 and
samba-common-3.0.33-3.15.el5_4.1. These versions include fixes for
security issues that were first fixed in
samba-client-3.0.33-0.18.el4_8 and samba-common-3.0.33-0.18.el4_8.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-2906, CVE-2009-1888,CVE-2009-2813
and CVE-2009-2948 to these issues.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201003405-SG
ESX 3.5 ESX patch pending
ESX 3.0.3 ESX patch pending
ESX 2.5.5 ESX patch pending
vMA 4.0 RHEL5 patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
b. Service Console update for acpid to1.0.4-9.el5_4.2
This updates changes the the acpid package to acpid-1.0.4-9.el5_4.2.
This version includes the fix for a security issue that was first
fixed in acpid-1.0.4-7.el5_4.1.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-0798 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201003403-SG
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
ESX 2.5.5 ESX not affected
vMA 4.0 RHEL5 patch pending
-
hosted products are VMware Workstation, Player, ACE, Server, Fusion.
-
Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX 4.0
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-195-20100324-069 238/ESX400-201003001.zip md5sum: c7c0f287d5728289fe2903be48d8d501 sha1sum: d90badd89247ccc96a02001b6d697bf39fad9e7c http://kb.vmware.com/kb/1019833
Note: ESX400-201003001 contains the following security bulletins ESX400-201003403-SG, and ESX400-201003405-SG
To install an individual bulletin use esxupdate with the -b option. esxupdate --bundle ESX400-201003403.zip -b ESX400-201003405-SG update
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798
- Change log
2010-04-01 VMSA-2010-0006 Initial security advisory after release of bulletins for ESX 4.0 on 2010-04-01.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2010 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8
wj8DBQFLtPVKS2KysvBH1xkRAr7QAJ9fmOGXceihgXteCto/P0/N4FOYpQCeNU+6 9mPchO6g2qdEqzK4oDoGbl8= =focv -----END PGP SIGNATURE----- .
Release Date: 2010-01-27 Last Updated: 2010-01-27
Potential Security Impact: Remote unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running HP CIFS Server (Samba). The vulnerability could be exploited to gain remote unauthorized access.
References: CVE-2009-2813
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP CIFS Server vA.02.03.04 and vA.02.04 running on HP-UX B.11.11, B.11.23, or B.11.31.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2009-2813 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve this vulnerabilities.
HP CIFS Server (Samba) vA.02.04.01 for HP-UX B.11.11, B.11.23, B.11.31
HP CIFS Server (Samba) vA.02.03.05 for HP-UX B.11.11, B.11.23, B.11.31
The updates are available for download from http://www.hp.com/go/softwaredepot/
MANUAL ACTIONS: Yes - Update Install vA.02.04.01 or subsequent or vA.02.03.05 or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security
Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a
specific HP-UX system. It can also download patches and create a depot automatically. For more information
see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11 HP-UX B.11.23 HP-UX B.11.31 ============= CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-MAN CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.02.04.01 or subsequent
HP-UX B.11.11 HP-UX B.11.23 ============= CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.02.03.05 or subsequent
HP-UX B.11.31
CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL CIFS-CFSM.CFSM-KRN CIFS-CFSM.CFSM-RUN action: install revision A.02.03.05 or subsequent
END AFFECTED VERSIONS
HISTORY Version: 1 (rev.1) - 27 January 2010 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. =========================================================== Ubuntu Security Notice USN-839-1 October 01, 2009 samba vulnerabilities CVE-2009-1886, CVE-2009-1888, CVE-2009-2813, CVE-2009-2906, CVE-2009-2948 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: samba 3.0.22-1ubuntu3.9 smbfs 3.0.22-1ubuntu3.9
Ubuntu 8.04 LTS: samba 3.0.28a-1ubuntu4.9 smbfs 3.0.28a-1ubuntu4.9
Ubuntu 8.10: samba 2:3.2.3-1ubuntu3.6 smbclient 2:3.2.3-1ubuntu3.6 smbfs 2:3.2.3-1ubuntu3.6
Ubuntu 9.04: samba 2:3.3.2-1ubuntu3.2 smbfs 2:3.3.2-1ubuntu3.2
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
J. An authenticated user could connect to that share name and gain access to the whole filesystem. (CVE-2009-2813)
Tim Prouty discovered that the smbd daemon in Samba incorrectly handled certain unexpected network replies. A remote attacker could send malicious replies to the server and cause smbd to use all available CPU, leading to a denial of service. A local user could exploit this to use or read the contents of unauthorized credential files. (CVE-2009-2948)
Reinhard Nißl discovered that the smbclient utility contained format string vulnerabilities in its file name handling. Because of security features in Ubuntu, exploitation of this vulnerability is limited. If a user or automated system were tricked into processing a specially crafted file name, smbclient could be made to crash, possibly leading to a denial of service. This only affected Ubuntu 8.10. (CVE-2009-1886)
Jeremy Allison discovered that the smbd daemon in Samba incorrectly handled permissions to modify access control lists when dos filemode is enabled. This only affected Ubuntu 8.10 and Ubuntu 9.04. (CVE-2009-1886)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.diff.gz
Size/MD5: 161616 0ad9aaba168245042d1489fdcdd5dc42
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.dsc
Size/MD5: 1203 e54ed933c8b093c77b7aecaccc1650ab
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22.orig.tar.gz
Size/MD5: 17542657 5c39505af17cf5caf3d6ed8bab135036
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.22-1ubuntu3.9_all.deb
Size/MD5: 6594720 714f26b307bf9c1d81392ef89dd57420
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.22-1ubuntu3.9_all.deb
Size/MD5: 6902292 116d5fcbf539e39460c4de1a03a2e5f1
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 427020 eac8d7f26dbbe0a51eb6dd2089d5318f
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 112902 78153d8ae792d0dad9913142ac80f304
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 798804 51db5cb3445e03ce20bc01df763626f0
http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 5974858 2984a44edeff38950c8b117ee5dfc50d
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 2415334 5a7e0073ee7714fa816d528ec7015e98
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 11893670 e9a72bdd6da691c06755694781c28cf0
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 3405114 c3db6785e7e379912107194b85a6c4c0
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 4042974 5b6d291f233ea349113f188c8b602922
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 450162 973bba455c72ac8f68c5266f4f6962c5
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 833738 7a32896e5bbbed676eb7d670b7b5c913
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_amd64.deb
Size/MD5: 1931042 3da6192d4e7d101613c5af8b3d29cddf
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 366694 f14155bac141ad7f941ba03e393c5270
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 112902 967c4537a0883400f4ee836d32b1acea
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 683712 002366bd9b55bd6a9e5b01482a03e532
http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 5068740 85a5168913d149757470d9604a132b8c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 2078578 5eb6ccc70dc94c0f04879d46d047b52e
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 9811828 e6daf862bdf89a5b2ae0e10b6ec7d46b
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 2852250 ce15a3ffa8bb74c1668e2e84af25f395
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 3353974 b359d873da6d8f2fbefb017c56a90d69
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 380190 25564c8fcbe3748d89352c3889224a38
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 711802 a3ea954b28c3b650e2a48672d6944205
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_i386.deb
Size/MD5: 1609834 7b3072248ab3b89584205aa234ccf555
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 410852 ef7fe6cfe269a839e44f3cf538d4ae38
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 112916 90aeed1dcdfc40442543b79b4c960027
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 777048 32b63354cd4ea69407f715a690f51856
http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 5693046 1903d9ec97fc80bf7ec844f0840b41ed
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 2359372 18c86a2b1c6ab25a370c2cdbd6661ead
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 11903932 d04b1ea8aee57ae0df5c29756c2c3b5a
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 3334618 7667bd29d3beb55a97e5a3b5577ecd41
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 3942780 9d951c0722867033b8281e1866fcba24
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 443270 b7f93c04656c39aa3dcbafc53ce0fa05
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 814458 10be46698881dd3c2cbc9a55a34d214d
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_powerpc.deb
Size/MD5: 1873756 4d919e6bf376e316a6195bfe5aae1a97
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 389762 dcc58f618c5dc2199ff041aeedd71d98
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 112918 27c0500abe2141de9472fc5dcb379a97
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 730528 fd413b1753a90c741cdbf767cf4c6a4b
http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 5427026 af95ac20b0047a3fd4c640d8536b950a
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 2145644 843c984664f3e644252ea6cdfddcb7d4
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 9723658 2639550c026db54b4bc5686e896dd510
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 2993030 8260ac9ace47cc8767b6935c2b3ef5ec
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 3508094 5c0ac997e1d96052f31b24fd1188a26f
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 400114 c4cef7889ece3a02aa7b59dd56b7a544
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 737168 42111d78eb3502791890f93c18d9b3bf
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_sparc.deb
Size/MD5: 1691634 30bf9470299d7414a3874c2a8adae78d
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.diff.gz
Size/MD5: 231391 7e2af7f7d745cc77c330ee843679d8ca
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.dsc
Size/MD5: 1586 2e4a432be1d531c58d1c120ffcd3a19c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a.orig.tar.gz
Size/MD5: 18172643 59754cb0c19da6e65c42d0a163c5885a
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.28a-1ubuntu4.9_all.deb
Size/MD5: 6622338 9380d43f5191a37cb32bcbab1bad7ae6
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.28a-1ubuntu4.9_all.deb
Size/MD5: 7009210 cc331f7f2efb8e800bbb8762b37e25e0
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 520546 b4b1240a3ff4d40a83f78a07c443c0f3
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 1292542 3bb97eca27dadd4722adb044a40adee5
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 967892 bc14c1047fbf66c1925e0c882ba92ee7
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 3058802 f54479769002e9afe5e91ee46ae5ff41
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 20893780 4edd6952575bc8c73d1d36d41ecbb479
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 4194456 879f5a1f38a4fe9578a8a0493d522162
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 5304436 3eb8858a5b14da4623dd48bf10f9fb73
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 430122 fe85b84ec13ae940f9d2768464d709a4
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 1048832 f6895c2fa5b41dbd8eba7d88194abf41
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_amd64.deb
Size/MD5: 2473112 74df91dbdde172e3899b100652695a45
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 472252 15042a9ebf034ea53ba563c791763385
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 1201976 727bb81955ba29c4c41bf874c47d14b1
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 887392 ff28ffd04701e889014f83c492e8a992
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 2840618 9bd4fdf53cd7b0b0b3bb4b3ec434fef9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 20216796 ced1db63e3cb543459c4cdb7f10a1bdf
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 3840538 2cd8ab43090b315d116894170ec96d66
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 4863560 3898e31536f87d7dde65502d17ce05b6
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 397132 250691215f69c151186945b5a55b0b98
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 974478 dd38262a108a87c928dcc50f3389a3a9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_i386.deb
Size/MD5: 2248406 896ce555ed798423eeb88fff50eb8b30
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 463234 08b9ee8f8361646792eb439ae045269b
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 1168374 2e2979e9f98c9b5dd73fb6c2da0911df
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 864522 130273d8f0f9ad49e0c383ef52fd6e1d
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 2779576 c0d8f3966307a5858d880d033603b3f5
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 20585618 d36b13bf28a9a3fc131c0f33b152d47e
http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 3756770 eca1116f745d9766285c0d0a74d5b644
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 4734470 762b151daed66156092d163b0f406c20
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 390026 dbee68f037d577cd5439719c7fb92a41
http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 951286 38e35eeaf91c45ca56565219149abd99
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_lpia.deb
Size/MD5: 2195544 d64ab228f0342e4d67ec3b5f20216018
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 515832 2ad077d63b6144cf907ab9988baf0139
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 1200004 bf7ae58acb99cc3db2fab99638c95fa9
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 956626 fda0b121c55858f6b66bcacb2b0461f8
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 2990960 bcb29d58590b755074a365c552136c0a
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 21182522 2c0803fafa6fbd40aa3e104ba56bbc0d
http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 4126290 ccf21a784b39e047c6dc194755fdca7d
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 5163400 74bd882877f5523cafc680de256290fb
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 431514 959ff71f764937096d6f15a655dfaee6
http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 1018106 2b184bd834d898febb1ef227bfd1fb90
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_powerpc.deb
Size/MD5: 2420168 d39a44b7f9f8e154ad1c6a7cd7c47744
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 474682 4e2ebf556bf2aebc6ba6451f28c5b880
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 1264254 0e1762140c135589e5a82bb690bd7770
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 882412 8923f26cae63e096cbc88e036851486f
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 2780260 1538097139e3853e5123c022bb0b0f1c
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 18529580 59a25ca374c053660116dce03011abea
http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 3802920 8fc30eccc623c180c4fc162102867fe1
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 4742870 aa4f92e69ad826b22fa1946e68e987da
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 396682 60fdbb3079527176c177305bb648ca07
http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 948132 18f33ffe44b9d32f4b7cc8d8885b3dc1
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_sparc.deb
Size/MD5: 2217900 bb8577eb34a3226359c58667ec2a9afb
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.diff.gz
Size/MD5: 236931 4f9651b8fc38ae5775cc57b2d987f44e
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.dsc
Size/MD5: 1902 f281832cebbef598586013098bd67400
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3.orig.tar.gz
Size/MD5: 23704996 c1630a57ac0ec24bc364c6d11c93ec35
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.2.3-1ubuntu3.6_all.deb
Size/MD5: 6261910 503b40ccc2f657eeb7c25bac480c4bf6
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.2.3-1ubuntu3.6_all.deb
Size/MD5: 7955234 412fd71fd346e66011f76a5af0466398
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 639534 bbbfbbead71027d2419fcb27fba42407
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 1969252 a01c75db248048dddac69a59a81c7f89
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 1370904 0e1727442db6c636569c25822d1fdbf0
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 89560 6603c0860d68ad2819d718c6d05ec5d4
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 3817612 7784145651faa822dc74d0976a99338c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 1994386 6a019c4493229ae31edfea3ee46cb71c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 5805124 d1c605957d71007be0fda1a15694d518
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 4909508 1e5b668561555630f24091af0cd6d4e5
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 7176252 7aa07ad7649a4446681b76847e5f5cb7
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 1530810 d6ddcc2f344f71c83f61b9ecb7b0c5a7
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 1113428 0379fc7d057771de7b437fecfc7966e6
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_amd64.deb
Size/MD5: 3351366 ee45f0cb769c6c28f8a347d34d338d7e
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 574924 506af0e56dff7d0fe7ab51ab469c47e6
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 1845352 e6ed7ca7f84020e149e808fe64311cf3
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 1218372 72aec547fa38b0a064bf0e60466fda42
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 88078 ab33ce6e5cefa515a699aca9cdc461e9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 3461470 17ffeb64ecd64f184e97a943c5eb9e6e
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 2078640 3c519d38299e6fdbd07f4f4d72aef95c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 5163590 5222f9aea0fdf9a2acc5d95318948284
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 4369460 34806faae06578a1051d568c5cea17f9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 6405268 02e19a3061477a8811d8d25709fe53e4
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 1376806 d13a79928b41c7973a1a0c1ba691a722
http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 1007482 eae4a6678ae8130648a5fb572b0c8998
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_i386.deb
Size/MD5: 2977186 b4ee501767e1e5a49741ccbda78425d0
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 554422 ff03551a483e90441db25c4c7692cd95
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 1769968 6ec919b02183c89b9aa80134249e4b52
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 1161338 2516d6d888b98b3bd8a3b6d74a5937a6
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 87506 38b8b5788656a29cb0db8a13cb8b9480
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 3330112 84aac2e247aab6dd9efb162409f0aadc
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 2071010 56f8a2fbd9e80523ef4912c691676adf
http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 4952144 af73024709a58ee64f805f77077d1364
http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 4199086 a1f7386a5d5692d4b1e995ecd8f3bb87
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 6137958 e0a1a5d5aec37facd2c1330cfb56dfd2
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 1318062 bf22cc094c4e89d8770fd845e855a387
http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 969198 83f81cfc7d9ee22b599b505ba3ae3f05
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_lpia.deb
Size/MD5: 2857452 2b48cd916e54e46d5f0452303d3851d3
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 607408 559831ff717451c998e29d4eddb3e034
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 1731182 bd5a801be1d73c5ac033548987dde264
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 1255860 6efaefbeafe04c3103d84f2c105d1872
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 89508 9c3081f940474a1f415678746f6243f6
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 3601302 a0ce49b8f3aab2a28cb22765b063694c
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 2059040 92ad3324c83002e8b9783960ea40a036
http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 5477608 0e38befb17ef64fd0ced6d2643dbf8da
http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 4641844 d31adf2bfafb586243e2faf535953e42
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 6659150 956f64674dd5cb7bb3f8bac62895d24d
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 1418796 8df76629fdc1fc014f9abfa1514540cc
http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 1046932 6fdfbbf2b39c0b4962f3831538863e78
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_powerpc.deb
Size/MD5: 3124852 6c04f13595d0573d71cde5987ac264dd
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 593506 b4870d6be6ef7a61ed6c5a2e4aeae16d
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 2008990 878258bf3efa14b921dd567103a80deb
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 1216706 c488460e14273a93f0540c84c3248cee
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 88094 3a6d77a02f0e6acaba23e4b9549e69b8
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 3503522 8ecc0f2c8d5f4cd8e4e0c796ac5722b5
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 2008706 4fff798d96bf44cec97af54ca04db241
http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 5332248 9d183a23e7fd5f7f3994dcb711a37e97
http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 4505892 c62a9e2bc675ce3649466cc130add2fe
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 6450016 54ee993bca2684d4e01b9f6f5a44c85e
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 1372100 5aee6497bb5977e8e307157daba0c230
http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 1020422 bfdb2375fc15aef8e2c9fe3a57c1af02
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_sparc.deb
Size/MD5: 3030996 c0ca89ffac33688bdfe227fe26019fe5
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.diff.gz
Size/MD5: 246744 ae710e82bc844bc0784713c356a65fe0
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.dsc
Size/MD5: 2101 c340588b3010c9b5a7f33001a653ffb7
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2.orig.tar.gz
Size/MD5: 26058163 5c5178ea2c5d9bd5f6569285f2e0e6d7
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.3.2-1ubuntu3.2_all.deb
Size/MD5: 6710652 9d2f3fef5b10b37a00c35671153b3632
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.3.2-1ubuntu3.2_all.deb
Size/MD5: 7994730 28f301eba9f060eea631aff3a1c263c2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 646652 2d5d4e46c0aea5af01fe5e9c6bbb9b28
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 2163380 c9423c1d10a0c24318882bbf169c824b
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 1508304 23c2a769c2998d346a712858cfff8cf9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 98292 b7c4155820c63d283d503927f9cee94a
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 4467650 c0b7ef8b7211281f0db3949011abbea1
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 36711768 99fd9b5afc6a4323e86e846cb72136b9
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 5071440 dc9efb1ace97ea837b6114f0dade6322
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 9018812 3a5e01312117b39737a09978ba9f9e43
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 1688934 59e11957943a573564aa166d4b018d3c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 3895728 9eb9988344d07744de3eb780b4c42b4a
http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 5713268 b9146cd614816390dcae0cc91683221b
http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_amd64.deb
Size/MD5: 1542412 0c67889bbb7e28462b2124440ab654ca
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 582222 0219aff733081399d32448732dd96294
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 2032960 750ff75ee3478437edf9e1d19e782e27
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 1347184 3775216596791dc048b765b89abb05b3
http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 96638 d425c4783b30a1c0ad46407cd1f04dc8
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 4060442 34801ccdac63f1bdf9b10b637b1d4f6e
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 34984314 e8551db86917575071e55762d87d3b85
http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 4527948 12e6be455b45d0ce4245ab1105a5f96c
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 8097728 251cc0883c670ee19edf0078a058c852
http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 1521034 e3f8b5995d81ba1f6c968ac32fc0d0be
http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 3481570 a29f9da468b535c2da5e9923010d1d6d
http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 5099016 362165caee8cd0bba16258f66c073cc6
http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_i386.deb
Size/MD5: 1400948 84221b1da74bdb5f5787f68de8952355
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 560958 962b835eefa46cc6bde4832d0e88121f
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 1952880 f9f1fb19bb809aaa6d3aad7242a4bb72
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 1283570 af16ecb6dfd504c40dc56317b34ce9d3
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 95956 a768287e6b93040ef2cb35ec8e7d7d41
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 3904320 fc222ca31831d73c84faa7d1e2490974
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 35290838 396e2a07747efbc6823f6eec6f7edd53
http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 4346314 6297c298aed6f3a4de613d54a1dcf749
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 7754410 c48267678450b0603139bc08e1edbbaf
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 1456666 f9b855b88c6a45b04e707a18aa55b9e0
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 3339424 5ce5bd4288830a8300a44b5c52768cf3
http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 4890862 dd221351f63783646d4e4f22d678c055
http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_lpia.deb
Size/MD5: 1346736 d51baf9446d9fd010828a0131c1d3267
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 614320 8da8875e3c2226c83ecc5a40d97b2cb2
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 1900044 953213cf62382b4b8b3a45d3f7def0ee
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 1382664 7c6ed21ea30b0ebcb0462ceb1c3f8e16
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 98086 c0f91f3844450ae41d6e3b0115f20591
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 4200232 98576bc60ab7737cb5bb547f29e1a5dc
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 35738340 9d638bf8c1ab59847995b9ca2c55d56a
http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 4804652 8a7d4638dac9533316b1f0a020dccd3f
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 8333880 e1b4a75d2ad6a9725584243883312f3e
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 1565914 aac094d4e42580986c2056c2256209c5
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 3630424 7b6143e9fa2e47c716023e3f37d92768
http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 5398448 60faa062e6ad2f7276f61efa06bca513
http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_powerpc.deb
Size/MD5: 1436246 32c9c1f616da971f6b149630da05ab30
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 600048 2552f5b27c823718c0862c5b76ca9f63
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 2213024 65ecad7035168477e207bbc5ed1d0c29
http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 1339606 cf15ae0ff3b54429d4f66917b5d406ed
http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 96454 a7c4796444e2146c181a9222c7710970
http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 4080446 b1728440e3d6a92683d620f398b496c1
http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 32778340 0ca389ca9b68bf428c7e94ed23603353
http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 4657980 997f813c1e1da2decb4c84970c72dd77
http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 8060996 ee6756467677a4fc46fab626b8be0396
http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 1512774 2ea893dd60671f3cac6c24fc42db131f
http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 3513456 2d5d634bd732ee034f0d10239bb26944
http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 5250174 fd91190a66a41ab02deb6741b2035559
http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_sparc.deb
Size/MD5: 1395758 225e6ebcb5b001906b5014af4a40c3e3
. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Samba Information Disclosure and Denial of Service
SECUNIA ADVISORY ID: SA36893
VERIFY ADVISORY: http://secunia.com/advisories/36893/
DESCRIPTION: Some weaknesses and a vulnerability have been reported in Samba, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious users to disclose sensitive information and cause a DoS (Denial of Service).
1) The mount.cifs application does not properly verify if opening a credentials file crosses the privileges of the invoking user. This can be exploited to disclose partial file contents by using the "--verbose" or "-v" option and passing the file as credentials file to mount.cifs.
Successful exploitation requires that mount.cifs is suid root.
2) An infinite loop exists when processing certain SMB requests. This can be exploited to cause a DoS due to CPU consumption by sending a specially crafted request to the Samba server.
Successful exploitation requires that the attacker is authenticated.
3) Samba does not properly handle /etc/passwd entries with empty home directories, which can lead to access to the root file system and all subdirectories.
Successful exploitation requires that an /etc/passwd entry with an empty home directory exists and automated "[homes]" sharing is enabled or a share with the username of the affected entry exists. http://samba.org/samba/download/
Patches are also available: http://www.samba.org/samba/history/security.html
PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Ronald Volgers. 2) The vendor credits Tim Prouty, Isilon and Samba Team 3) The vendor credits J. David Hester, LCG Systems National Institutes of Health
ORIGINAL ADVISORY: 1) http://www.samba.org/samba/security/CVE-2009-2948.html 2) http://www.samba.org/samba/security/CVE-2009-2906.html 3) http://www.samba.org/samba/security/CVE-2009-2813.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Additionally for 2009.1 the version upgrade provides many upstream bug fixes such as improved Windows(tm) 7 support.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948 http://www.samba.org/samba/security/CVE-2009-2813.html http://www.samba.org/samba/security/CVE-2009-2906.html http://www.samba.org/samba/security/CVE-2009-2948.html
Updated Packages:
Mandriva Linux 2008.1: 4f552578709de0466d922e8a0759f8be 2008.1/i586/libsmbclient0-3.0.37-0.1mdv2008.1.i586.rpm 9bb222210c3a99989ddb6c3479c8cd6d 2008.1/i586/libsmbclient0-devel-3.0.37-0.1mdv2008.1.i586.rpm cecadda3b37593746894536d2392d5c1 2008.1/i586/libsmbclient0-static-devel-3.0.37-0.1mdv2008.1.i586.rpm 7edfbf4deea7b57e7c7db53c85d62a41 2008.1/i586/mount-cifs-3.0.37-0.1mdv2008.1.i586.rpm 7a4a8d4577893ef1a0b410d1d2a1420e 2008.1/i586/nss_wins-3.0.37-0.1mdv2008.1.i586.rpm 236a200f0fea567b71b2fc6b2ab76d01 2008.1/i586/samba-client-3.0.37-0.1mdv2008.1.i586.rpm 1ab41b7a86e1100ebfc0f8a3f3c7585a 2008.1/i586/samba-common-3.0.37-0.1mdv2008.1.i586.rpm e26405b50094478abf9c8e6f0cecb4d1 2008.1/i586/samba-doc-3.0.37-0.1mdv2008.1.i586.rpm 92c5ee7aa8a23df6f8e63e721d6cd1eb 2008.1/i586/samba-server-3.0.37-0.1mdv2008.1.i586.rpm 4192000a9c943240cc49285172a4365a 2008.1/i586/samba-swat-3.0.37-0.1mdv2008.1.i586.rpm 4979847252345d54d1ca4d57f2eab2f7 2008.1/i586/samba-vscan-icap-3.0.37-0.1mdv2008.1.i586.rpm 47272746a7af49923bd4f7599905a533 2008.1/i586/samba-winbind-3.0.37-0.1mdv2008.1.i586.rpm 814b5cbb37717cfb25d86de35231c436 2008.1/SRPMS/samba-3.0.37-0.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: ced0d1b4aebfc1dcf3640e2d0eb22668 2008.1/x86_64/lib64smbclient0-3.0.37-0.1mdv2008.1.x86_64.rpm 9d4efa92699f9cfa9cb67cbfc8e0bf80 2008.1/x86_64/lib64smbclient0-devel-3.0.37-0.1mdv2008.1.x86_64.rpm b951dd85f7b5520615a8bfa9efa94e15 2008.1/x86_64/lib64smbclient0-static-devel-3.0.37-0.1mdv2008.1.x86_64.rpm c989e22b38dd6190655a6a147d9b4320 2008.1/x86_64/mount-cifs-3.0.37-0.1mdv2008.1.x86_64.rpm 1c5d88beecca4b39e814c865f67d67f1 2008.1/x86_64/nss_wins-3.0.37-0.1mdv2008.1.x86_64.rpm c4c16d39b64ab8a63f9a04af29984cf3 2008.1/x86_64/samba-client-3.0.37-0.1mdv2008.1.x86_64.rpm 1afe4d19ed5ad2409c03399dd23bde51 2008.1/x86_64/samba-common-3.0.37-0.1mdv2008.1.x86_64.rpm 9913781e24af986bbdace14171361726 2008.1/x86_64/samba-doc-3.0.37-0.1mdv2008.1.x86_64.rpm ebe658ed48038b5cce733c78775e2948 2008.1/x86_64/samba-server-3.0.37-0.1mdv2008.1.x86_64.rpm 9db457d2ec2e6694eedc71e65686e075 2008.1/x86_64/samba-swat-3.0.37-0.1mdv2008.1.x86_64.rpm c53a88fc82dd5a7ddc4c33c606a50ce6 2008.1/x86_64/samba-vscan-icap-3.0.37-0.1mdv2008.1.x86_64.rpm f6419abf5f60d68a7f5255a24493ca94 2008.1/x86_64/samba-winbind-3.0.37-0.1mdv2008.1.x86_64.rpm 814b5cbb37717cfb25d86de35231c436 2008.1/SRPMS/samba-3.0.37-0.1mdv2008.1.src.rpm
Mandriva Linux 2009.0: efb050a33295b9425e3ca8fb9ec05fef 2009.0/i586/libnetapi0-3.2.15-0.1mdv2009.0.i586.rpm 846e3afd2bab276430d7cde4fdf03c0e 2009.0/i586/libnetapi-devel-3.2.15-0.1mdv2009.0.i586.rpm b852a65671ff7559ead332fd72bb5c94 2009.0/i586/libsmbclient0-3.2.15-0.1mdv2009.0.i586.rpm 21c04220c90da910f918e302e52666d9 2009.0/i586/libsmbclient0-devel-3.2.15-0.1mdv2009.0.i586.rpm 1e3c49a52489d2acd356cccd04cd56eb 2009.0/i586/libsmbclient0-static-devel-3.2.15-0.1mdv2009.0.i586.rpm 922b7d1fc60659c443a22a5cf9141ea4 2009.0/i586/libsmbsharemodes0-3.2.15-0.1mdv2009.0.i586.rpm a5f28ffcefbc37adfd5004336a2fe6a0 2009.0/i586/libsmbsharemodes-devel-3.2.15-0.1mdv2009.0.i586.rpm 3a2666105db13504afec89f7dd6a67d0 2009.0/i586/libtalloc1-3.2.15-0.1mdv2009.0.i586.rpm ab99aadd26276c8bbc96da52fcd3fb46 2009.0/i586/libtalloc-devel-3.2.15-0.1mdv2009.0.i586.rpm c2bcd60467dc197621a4a8b578ab8d2f 2009.0/i586/libtdb1-3.2.15-0.1mdv2009.0.i586.rpm e47ba9b65282116a881cd8a1d0f5752d 2009.0/i586/libtdb-devel-3.2.15-0.1mdv2009.0.i586.rpm 819c8b8e12043dff6f85f266e1092cf9 2009.0/i586/libwbclient0-3.2.15-0.1mdv2009.0.i586.rpm e21c0cf32e7b3ac82621c4cf20eb8ffc 2009.0/i586/libwbclient-devel-3.2.15-0.1mdv2009.0.i586.rpm ecd74601bbe8661a4424cbf9a24fd9dc 2009.0/i586/mount-cifs-3.2.15-0.1mdv2009.0.i586.rpm 656b6e76ea691407eb02eec624d2111e 2009.0/i586/nss_wins-3.2.15-0.1mdv2009.0.i586.rpm d80dd9a24fcdaf2a96e481a38e68713b 2009.0/i586/samba-client-3.2.15-0.1mdv2009.0.i586.rpm d9065426a3838bd6666db3411392de4a 2009.0/i586/samba-common-3.2.15-0.1mdv2009.0.i586.rpm 7513c3208fab5355ad869e2630861d31 2009.0/i586/samba-doc-3.2.15-0.1mdv2009.0.i586.rpm e208d566b753481fb9615f5f1f5c37be 2009.0/i586/samba-server-3.2.15-0.1mdv2009.0.i586.rpm 31658503f04a3a153b4d65fe62e7f9a5 2009.0/i586/samba-swat-3.2.15-0.1mdv2009.0.i586.rpm 764c09b5bbddf403e41024db390ce4f8 2009.0/i586/samba-winbind-3.2.15-0.1mdv2009.0.i586.rpm 92f632db2a533f9ffbcbcbe260d2bedc 2009.0/SRPMS/samba-3.2.15-0.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: ff6635036aaeadf00de68e48ad77c7a4 2009.0/x86_64/lib64netapi0-3.2.15-0.1mdv2009.0.x86_64.rpm 93dbe82080fcc4f3332b4aa90c2ac9b2 2009.0/x86_64/lib64netapi-devel-3.2.15-0.1mdv2009.0.x86_64.rpm 39b9c79e40c41d62c7ca7440fa097039 2009.0/x86_64/lib64smbclient0-3.2.15-0.1mdv2009.0.x86_64.rpm 4cac1729ea43ca02f485e071c5ff0681 2009.0/x86_64/lib64smbclient0-devel-3.2.15-0.1mdv2009.0.x86_64.rpm d0e8589df5efbcf9fcc2f6192af3cb6d 2009.0/x86_64/lib64smbclient0-static-devel-3.2.15-0.1mdv2009.0.x86_64.rpm 9156de31384ce156d30d4e9535634e59 2009.0/x86_64/lib64smbsharemodes0-3.2.15-0.1mdv2009.0.x86_64.rpm ce72a170e7af1edc4cdc9121d868999f 2009.0/x86_64/lib64smbsharemodes-devel-3.2.15-0.1mdv2009.0.x86_64.rpm a97a5555b1e937f706d500386f90a030 2009.0/x86_64/lib64talloc1-3.2.15-0.1mdv2009.0.x86_64.rpm 431e616754fff2e16a951ea51939e42b 2009.0/x86_64/lib64talloc-devel-3.2.15-0.1mdv2009.0.x86_64.rpm 51c7e0bc2006bceb6149804e18db9335 2009.0/x86_64/lib64tdb1-3.2.15-0.1mdv2009.0.x86_64.rpm 353b8080b16182401577c206d05cd9fb 2009.0/x86_64/lib64tdb-devel-3.2.15-0.1mdv2009.0.x86_64.rpm 301ba572774619cf6b6f6d21c1b22dd8 2009.0/x86_64/lib64wbclient0-3.2.15-0.1mdv2009.0.x86_64.rpm 3003a8b8a48b25bb13e309ba059f54af 2009.0/x86_64/lib64wbclient-devel-3.2.15-0.1mdv2009.0.x86_64.rpm c3c0d95f1da6710dfe86c28b1b977b86 2009.0/x86_64/mount-cifs-3.2.15-0.1mdv2009.0.x86_64.rpm 95ffa0c8fc90b800a012cdfe458fd2f1 2009.0/x86_64/nss_wins-3.2.15-0.1mdv2009.0.x86_64.rpm fbe98a877504a9512dc40335b52fe8f9 2009.0/x86_64/samba-client-3.2.15-0.1mdv2009.0.x86_64.rpm dc8e880521d644a9d1db998c5cb65204 2009.0/x86_64/samba-common-3.2.15-0.1mdv2009.0.x86_64.rpm 66bf7a44a5b4d1c4fc66bf2cca34c40c 2009.0/x86_64/samba-doc-3.2.15-0.1mdv2009.0.x86_64.rpm e69179920eb13e9c4b6b77c9dd23c09b 2009.0/x86_64/samba-server-3.2.15-0.1mdv2009.0.x86_64.rpm f160eb1bb56f3fcf09c3c7d144dadc05 2009.0/x86_64/samba-swat-3.2.15-0.1mdv2009.0.x86_64.rpm c25b1e8ebb3ae619e50114d7161221bc 2009.0/x86_64/samba-winbind-3.2.15-0.1mdv2009.0.x86_64.rpm 92f632db2a533f9ffbcbcbe260d2bedc 2009.0/SRPMS/samba-3.2.15-0.1mdv2009.0.src.rpm
Mandriva Linux 2009.1: 16d55726ae18c141c64559bf33155d0e 2009.1/i586/libnetapi0-3.3.8-0.1mdv2009.1.i586.rpm 677c6a78ca9087546767cd152f090b96 2009.1/i586/libnetapi-devel-3.3.8-0.1mdv2009.1.i586.rpm 59ff6473e2f4d60a96edbf00d120170d 2009.1/i586/libsmbclient0-3.3.8-0.1mdv2009.1.i586.rpm 4a9e3207ab02fde3b94c744fbc54761a 2009.1/i586/libsmbclient0-devel-3.3.8-0.1mdv2009.1.i586.rpm f8727f9a406380bf3cc63872029dd32d 2009.1/i586/libsmbclient0-static-devel-3.3.8-0.1mdv2009.1.i586.rpm a7a70efa02ad348fedeb44a640112e14 2009.1/i586/libsmbsharemodes0-3.3.8-0.1mdv2009.1.i586.rpm 44d95965a29b1c6b67e25d804bc12516 2009.1/i586/libsmbsharemodes-devel-3.3.8-0.1mdv2009.1.i586.rpm 81878c3eaa03b9a83478189fec6f7055 2009.1/i586/libwbclient0-3.3.8-0.1mdv2009.1.i586.rpm ba295f2fb6115acf4018077d7a927437 2009.1/i586/libwbclient-devel-3.3.8-0.1mdv2009.1.i586.rpm 9234fc94eac761caa56944841539a8a5 2009.1/i586/mount-cifs-3.3.8-0.1mdv2009.1.i586.rpm 8214ceee6fb0874c5c2e89cc247fbd28 2009.1/i586/nss_wins-3.3.8-0.1mdv2009.1.i586.rpm 2c00ad654c8f2b5babd0050486c06182 2009.1/i586/samba-client-3.3.8-0.1mdv2009.1.i586.rpm 9cf733e60cc0f87b5d328a57169ff4a0 2009.1/i586/samba-common-3.3.8-0.1mdv2009.1.i586.rpm dc3b4a5b52d67377a71b2bb1c332e755 2009.1/i586/samba-doc-3.3.8-0.1mdv2009.1.i586.rpm 7481e9496d4187f29b1c8d174f34abbb 2009.1/i586/samba-server-3.3.8-0.1mdv2009.1.i586.rpm 235c1eb352b8cdd857b4c30653fa3731 2009.1/i586/samba-swat-3.3.8-0.1mdv2009.1.i586.rpm 2e25863f3fea545174b2528273fc39b1 2009.1/i586/samba-winbind-3.3.8-0.1mdv2009.1.i586.rpm c07466ff2422da51dc1500758b3bdf2e 2009.1/SRPMS/samba-3.3.8-0.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64: 2585e0e6504670b25acd056e96a1666a 2009.1/x86_64/lib64netapi0-3.3.8-0.1mdv2009.1.x86_64.rpm d5667734e27c7c9e1f1ce543d0a69bcf 2009.1/x86_64/lib64netapi-devel-3.3.8-0.1mdv2009.1.x86_64.rpm 1cae57e6142b5f9852964f57c2448417 2009.1/x86_64/lib64smbclient0-3.3.8-0.1mdv2009.1.x86_64.rpm aec3399d0094ac2d2a8df6c04cc8cd80 2009.1/x86_64/lib64smbclient0-devel-3.3.8-0.1mdv2009.1.x86_64.rpm 0101adb5e56ea9239d01a6b95265df8e 2009.1/x86_64/lib64smbclient0-static-devel-3.3.8-0.1mdv2009.1.x86_64.rpm 221ab5e516926ef22e29de68a5fbb401 2009.1/x86_64/lib64smbsharemodes0-3.3.8-0.1mdv2009.1.x86_64.rpm 5093da6bf343f563cbba01adba788238 2009.1/x86_64/lib64smbsharemodes-devel-3.3.8-0.1mdv2009.1.x86_64.rpm 0727b03fc3e8facdf6171bbdbbc0b254 2009.1/x86_64/lib64wbclient0-3.3.8-0.1mdv2009.1.x86_64.rpm 3b64cde8fb59b5cc5301653f24b02298 2009.1/x86_64/lib64wbclient-devel-3.3.8-0.1mdv2009.1.x86_64.rpm 40b2c4c0458d02e9ec09c1f665650074 2009.1/x86_64/mount-cifs-3.3.8-0.1mdv2009.1.x86_64.rpm 0a070ac11d73d7c5005516868c8acb0f 2009.1/x86_64/nss_wins-3.3.8-0.1mdv2009.1.x86_64.rpm 8ce7fda815396961bc091a8de6d5aaca 2009.1/x86_64/samba-client-3.3.8-0.1mdv2009.1.x86_64.rpm 074e2419563fcc09941edb756786aafd 2009.1/x86_64/samba-common-3.3.8-0.1mdv2009.1.x86_64.rpm 35a4b8335e400d6817903a781ce60fae 2009.1/x86_64/samba-doc-3.3.8-0.1mdv2009.1.x86_64.rpm 91ed9e1f370de8ccafd97a4b6274af75 2009.1/x86_64/samba-server-3.3.8-0.1mdv2009.1.x86_64.rpm 0f3b675161add2e6e39bf7bcd8d0efc4 2009.1/x86_64/samba-swat-3.3.8-0.1mdv2009.1.x86_64.rpm 6303fb16df9f940a83574aa02c15ecd8 2009.1/x86_64/samba-winbind-3.3.8-0.1mdv2009.1.x86_64.rpm c07466ff2422da51dc1500758b3bdf2e 2009.1/SRPMS/samba-3.3.8-0.1mdv2009.1.src.rpm
Corporate 3.0: 24c5b1096fdea3139d16d4920e4f3d5e corporate/3.0/i586/libsmbclient0-3.0.14a-6.11.C30mdk.i586.rpm d9367df65666dc8f1cacbab3cd94759a corporate/3.0/i586/libsmbclient0-devel-3.0.14a-6.11.C30mdk.i586.rpm fac9eec996c5da54e13cc1a3272008aa corporate/3.0/i586/libsmbclient0-static-devel-3.0.14a-6.11.C30mdk.i586.rpm 18c14b2785aaa0fedcf7e75641359162 corporate/3.0/i586/mount-cifs-3.0.14a-6.11.C30mdk.i586.rpm ebd4e835fbe370ee891fca93b077e607 corporate/3.0/i586/nss_wins-3.0.14a-6.11.C30mdk.i586.rpm 3546cab569f983f83f5897af3660d02f corporate/3.0/i586/samba-client-3.0.14a-6.11.C30mdk.i586.rpm 928a14eb92d7298d2a17f0298ffa1724 corporate/3.0/i586/samba-common-3.0.14a-6.11.C30mdk.i586.rpm 463337aab33d8c41aacd091c0c3e43fc corporate/3.0/i586/samba-doc-3.0.14a-6.11.C30mdk.i586.rpm 8e8349ce95d2bfbd341779369b5025ea corporate/3.0/i586/samba-passdb-xml-3.0.14a-6.11.C30mdk.i586.rpm 5ec36e5ef8cb394357fc53c8da336c7e corporate/3.0/i586/samba-server-3.0.14a-6.11.C30mdk.i586.rpm 7028fabe6d04ce0fa301c64e4fdd917e corporate/3.0/i586/samba-smbldap-tools-3.0.14a-6.11.C30mdk.i586.rpm 1e122a5d446705da97c138a82bc3a172 corporate/3.0/i586/samba-swat-3.0.14a-6.11.C30mdk.i586.rpm 459c55822bf11d8c502026b4ab284fb0 corporate/3.0/i586/samba-vscan-antivir-3.0.14a-6.11.C30mdk.i586.rpm 7db0ce83564250560ffb82a5ec10621c corporate/3.0/i586/samba-vscan-clamav-3.0.14a-6.11.C30mdk.i586.rpm 179ba9e3360c9e75700332aa19994e62 corporate/3.0/i586/samba-vscan-icap-3.0.14a-6.11.C30mdk.i586.rpm eb52755bb9a984a2fd93318400a99e3a corporate/3.0/i586/samba-winbind-3.0.14a-6.11.C30mdk.i586.rpm e7d6547c08d05538ead2b1f583d72879 corporate/3.0/SRPMS/samba-3.0.14a-6.11.C30mdk.src.rpm
Corporate 3.0/X86_64: 25efb0f8851063dd4f85ce5efe366745 corporate/3.0/x86_64/lib64smbclient0-3.0.14a-6.11.C30mdk.x86_64.rpm 7bbcd06e7c3f79219aa1078a0cacbc97 corporate/3.0/x86_64/lib64smbclient0-devel-3.0.14a-6.11.C30mdk.x86_64.rpm f7be50563342779491e1338d8f4386db corporate/3.0/x86_64/lib64smbclient0-static-devel-3.0.14a-6.11.C30mdk.x86_64.rpm 838ef7ea583cb95cc863c8cf1425a3c1 corporate/3.0/x86_64/mount-cifs-3.0.14a-6.11.C30mdk.x86_64.rpm d30ce3c9fc8dc04a44856b8de5475d2a corporate/3.0/x86_64/nss_wins-3.0.14a-6.11.C30mdk.x86_64.rpm e678babbca3ead8a8776c21e836bd1f6 corporate/3.0/x86_64/samba-client-3.0.14a-6.11.C30mdk.x86_64.rpm 53de1c937fe96963251d43aa7135c936 corporate/3.0/x86_64/samba-common-3.0.14a-6.11.C30mdk.x86_64.rpm b378c72cd5da2e8744fc18f948ba2296 corporate/3.0/x86_64/samba-doc-3.0.14a-6.11.C30mdk.x86_64.rpm bb8bf3b0569c252d9d0d9192ae879b6d corporate/3.0/x86_64/samba-passdb-xml-3.0.14a-6.11.C30mdk.x86_64.rpm 35139f2f5c4a6e244570913e5069efe2 corporate/3.0/x86_64/samba-server-3.0.14a-6.11.C30mdk.x86_64.rpm 4171ce3978bbfd54a3f8ea2215cd997c corporate/3.0/x86_64/samba-smbldap-tools-3.0.14a-6.11.C30mdk.x86_64.rpm 5187188c8a9e7de056274a32b87c80da corporate/3.0/x86_64/samba-swat-3.0.14a-6.11.C30mdk.x86_64.rpm 8ede5f2d1cd5a62cdabeaf50846b917a corporate/3.0/x86_64/samba-vscan-antivir-3.0.14a-6.11.C30mdk.x86_64.rpm ba36875f98009a110ed3a866a163baf9 corporate/3.0/x86_64/samba-vscan-clamav-3.0.14a-6.11.C30mdk.x86_64.rpm 57c81613fafbc73fdfda56b42ce8e89d corporate/3.0/x86_64/samba-vscan-icap-3.0.14a-6.11.C30mdk.x86_64.rpm cc92aea8b3de4bd7031ad16cff1dd130 corporate/3.0/x86_64/samba-winbind-3.0.14a-6.11.C30mdk.x86_64.rpm e7d6547c08d05538ead2b1f583d72879 corporate/3.0/SRPMS/samba-3.0.14a-6.11.C30mdk.src.rpm
Corporate 4.0: 047660a6bf073366bd9b354078311ed8 corporate/4.0/i586/libsmbclient0-3.0.37-0.1.20060mlcs4.i586.rpm 2add9cc76f133c4a88816242518c632a corporate/4.0/i586/libsmbclient0-devel-3.0.37-0.1.20060mlcs4.i586.rpm 8e724f03722eaf5bd8a7f8f483175e1c corporate/4.0/i586/libsmbclient0-static-devel-3.0.37-0.1.20060mlcs4.i586.rpm 9c416f3cf56fad431d0ac51746841ce3 corporate/4.0/i586/mount-cifs-3.0.37-0.1.20060mlcs4.i586.rpm 41e03757979dbc08a735cc07eb70a59b corporate/4.0/i586/nss_wins-3.0.37-0.1.20060mlcs4.i586.rpm ea3291cde574a02eb3b6d9af74ffb2a8 corporate/4.0/i586/samba-client-3.0.37-0.1.20060mlcs4.i586.rpm af7624926aa5e3b6168208047d6c4c46 corporate/4.0/i586/samba-common-3.0.37-0.1.20060mlcs4.i586.rpm 8d77caca4375145ee8d3aa942622e428 corporate/4.0/i586/samba-doc-3.0.37-0.1.20060mlcs4.i586.rpm a40cc758d1ff0bfa623b06b601132a4f corporate/4.0/i586/samba-server-3.0.37-0.1.20060mlcs4.i586.rpm 860e1a63926f2882b2c95b61f87b6e42 corporate/4.0/i586/samba-swat-3.0.37-0.1.20060mlcs4.i586.rpm 668845748f59d8ab267077b409cf7d10 corporate/4.0/i586/samba-vscan-icap-3.0.37-0.1.20060mlcs4.i586.rpm 34826f546a50388da7532f64d7280894 corporate/4.0/i586/samba-winbind-3.0.37-0.1.20060mlcs4.i586.rpm a47770cd28d9d2f1204bb192df70375c corporate/4.0/SRPMS/samba-3.0.37-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 77f62b3eb1efd66a7ea3ba8d84a8d43c corporate/4.0/x86_64/lib64smbclient0-3.0.37-0.1.20060mlcs4.x86_64.rpm b7eea9e6f961648d40c0b0d6eda33019 corporate/4.0/x86_64/lib64smbclient0-devel-3.0.37-0.1.20060mlcs4.x86_64.rpm 2f8bcc3b5c02626a86d2c2d2f54b278a corporate/4.0/x86_64/lib64smbclient0-static-devel-3.0.37-0.1.20060mlcs4.x86_64.rpm a20859389b661bc5865d95025237e668 corporate/4.0/x86_64/mount-cifs-3.0.37-0.1.20060mlcs4.x86_64.rpm 5cad07ac4c044c60b185db3de3882b27 corporate/4.0/x86_64/nss_wins-3.0.37-0.1.20060mlcs4.x86_64.rpm 82e1f61d0efdb2d2933e34947674bd9e corporate/4.0/x86_64/samba-client-3.0.37-0.1.20060mlcs4.x86_64.rpm 4fc7c9673ababbbb18eb479145796894 corporate/4.0/x86_64/samba-common-3.0.37-0.1.20060mlcs4.x86_64.rpm e30ca5d0cc234b98d0dc8627a1bc1d05 corporate/4.0/x86_64/samba-doc-3.0.37-0.1.20060mlcs4.x86_64.rpm bf01a661b1f653e1aa8e59cdb667bbbe corporate/4.0/x86_64/samba-server-3.0.37-0.1.20060mlcs4.x86_64.rpm fcc1b0212eec0186a8c9a0ad41af6ad7 corporate/4.0/x86_64/samba-swat-3.0.37-0.1.20060mlcs4.x86_64.rpm da660519148e16f2c0cb9d21db2cb67a corporate/4.0/x86_64/samba-vscan-icap-3.0.37-0.1.20060mlcs4.x86_64.rpm 8bd44cc57cb93d30550f04094e25191c corporate/4.0/x86_64/samba-winbind-3.0.37-0.1.20060mlcs4.x86_64.rpm a47770cd28d9d2f1204bb192df70375c corporate/4.0/SRPMS/samba-3.0.37-0.1.20060mlcs4.src.rpm
Mandriva Enterprise Server 5: ee5e0ba339dae934a1cb81040603d0eb mes5/i586/libnetapi0-3.2.15-0.1mdvmes5.i586.rpm a2138a459fe213114948ecaa3c38eb0a mes5/i586/libnetapi-devel-3.2.15-0.1mdvmes5.i586.rpm 35900db03c61dc537536c469faca8892 mes5/i586/libsmbclient0-3.2.15-0.1mdvmes5.i586.rpm fd96f9d9da799991c497c5bcbdb8eb99 mes5/i586/libsmbclient0-devel-3.2.15-0.1mdvmes5.i586.rpm 80b763083318d3691be23ebbc40d1985 mes5/i586/libsmbclient0-static-devel-3.2.15-0.1mdvmes5.i586.rpm 4ae18fa289d37dea0d2bc5dfdb2317b9 mes5/i586/libsmbsharemodes0-3.2.15-0.1mdvmes5.i586.rpm ef80a8b52ce4b6d5330c58b3586e4481 mes5/i586/libsmbsharemodes-devel-3.2.15-0.1mdvmes5.i586.rpm d7fdd39eeaab7a8e3e5a062661817e67 mes5/i586/libtalloc1-3.2.15-0.1mdvmes5.i586.rpm 5e60b3bd0a75e0d54138802918fe729e mes5/i586/libtalloc-devel-3.2.15-0.1mdvmes5.i586.rpm c665f78c314702a64f08ae8f54552b9a mes5/i586/libtdb1-3.2.15-0.1mdvmes5.i586.rpm 706e6b795143f8c66a94525251354f4e mes5/i586/libtdb-devel-3.2.15-0.1mdvmes5.i586.rpm 3cc7fb704a4c2629ab22211c506b4e84 mes5/i586/libwbclient0-3.2.15-0.1mdvmes5.i586.rpm 5fb302fe81d2545189bb9d09c43a5121 mes5/i586/libwbclient-devel-3.2.15-0.1mdvmes5.i586.rpm ed17b8a6a8a5fe2e346a694a8f2d7d09 mes5/i586/mount-cifs-3.2.15-0.1mdvmes5.i586.rpm 7bf8865e9f5c2ca25727e223dff8255a mes5/i586/nss_wins-3.2.15-0.1mdvmes5.i586.rpm 8ee63ef26bf846b4678c2cb1014b8d74 mes5/i586/samba-client-3.2.15-0.1mdvmes5.i586.rpm f070d6b6c9575e19143e6821c6e001ff mes5/i586/samba-common-3.2.15-0.1mdvmes5.i586.rpm c320a8446ebc80e48f8f2a4b633a484b mes5/i586/samba-doc-3.2.15-0.1mdvmes5.i586.rpm 8e1bfda1593920a80c0eae11ccb3dbd1 mes5/i586/samba-server-3.2.15-0.1mdvmes5.i586.rpm 01fb4c1c14c04e4752725de9a0bc0eac mes5/i586/samba-swat-3.2.15-0.1mdvmes5.i586.rpm 65ce6c6c1dfa009bcc43315a5ec4ccf3 mes5/i586/samba-winbind-3.2.15-0.1mdvmes5.i586.rpm 03855a2e42003a125af121eb9738ebd5 mes5/SRPMS/samba-3.2.15-0.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64: ad357d021aaea783c3a9582e36e5e6bd mes5/x86_64/lib64netapi0-3.2.15-0.1mdvmes5.x86_64.rpm 6913e5c18f96b3f54bbe9b93e6edb8d6 mes5/x86_64/lib64netapi-devel-3.2.15-0.1mdvmes5.x86_64.rpm 86fc5c1e35809123367b7ae28ba03eb9 mes5/x86_64/lib64smbclient0-3.2.15-0.1mdvmes5.x86_64.rpm 0b4c0a7481de6b52ea593a9f5e9b584b mes5/x86_64/lib64smbclient0-devel-3.2.15-0.1mdvmes5.x86_64.rpm 007c85e7b30e817ea0ff3298318ba10b mes5/x86_64/lib64smbclient0-static-devel-3.2.15-0.1mdvmes5.x86_64.rpm 66034bc8194eb1dd4543e719c175f09a mes5/x86_64/lib64smbsharemodes0-3.2.15-0.1mdvmes5.x86_64.rpm 7f6fee0d5d832dd4034bb4b75ac37067 mes5/x86_64/lib64smbsharemodes-devel-3.2.15-0.1mdvmes5.x86_64.rpm eca90c14a1d4bde2f644c2d1fd6ef3c6 mes5/x86_64/lib64talloc1-3.2.15-0.1mdvmes5.x86_64.rpm 9976c09999010e7941bbe0dc1fe6ca5f mes5/x86_64/lib64talloc-devel-3.2.15-0.1mdvmes5.x86_64.rpm aab081f61e82ddf3f632790f27cb5ce7 mes5/x86_64/lib64tdb1-3.2.15-0.1mdvmes5.x86_64.rpm 7e09992d972229bb7a6ebd82652c8901 mes5/x86_64/lib64tdb-devel-3.2.15-0.1mdvmes5.x86_64.rpm 4eac64f49ac6a1de779880dd5cb35ac2 mes5/x86_64/lib64wbclient0-3.2.15-0.1mdvmes5.x86_64.rpm 97bc3355ba4fb14cf7fdcf3de573a756 mes5/x86_64/lib64wbclient-devel-3.2.15-0.1mdvmes5.x86_64.rpm 58e2bad7d693718fa7b2325c9a3ffe7d mes5/x86_64/mount-cifs-3.2.15-0.1mdvmes5.x86_64.rpm 5f5705776b2d82f177e9bacc65871f54 mes5/x86_64/nss_wins-3.2.15-0.1mdvmes5.x86_64.rpm 77fceb32cdfe7d51c18af0cff52e04c6 mes5/x86_64/samba-client-3.2.15-0.1mdvmes5.x86_64.rpm c2bb12c0752dbed3294b4c0c5916e8c0 mes5/x86_64/samba-common-3.2.15-0.1mdvmes5.x86_64.rpm 53356120576a52daa576305583312f42 mes5/x86_64/samba-doc-3.2.15-0.1mdvmes5.x86_64.rpm 8c3ea40fa44b17279b3ac6143696833d mes5/x86_64/samba-server-3.2.15-0.1mdvmes5.x86_64.rpm 642a8cb6ec8f6c8324b16afe7e65359b mes5/x86_64/samba-swat-3.2.15-0.1mdvmes5.x86_64.rpm b75993170697d32dec52afecc79c991f mes5/x86_64/samba-winbind-3.2.15-0.1mdvmes5.x86_64.rpm 03855a2e42003a125af121eb9738ebd5 mes5/SRPMS/samba-3.2.15-0.1mdvmes5.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFK1bXKmqjQ0CJFipgRAnbTAKDYpf2++bD/H+jbl61t8P9IXw2GuACguZoT zmZwuB3govO6Ux2stXPDUps= =KymD -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200909-0782", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "samba", "scope": "eq", "trust": 1.9, "vendor": "samba", "version": "3.4.1" }, { "model": "samba", "scope": "eq", "trust": 1.9, "vendor": "samba", "version": "3.3.5" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.4" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3.0" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3.2" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3.4" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3.3" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.4.0" }, { "model": "samba", "scope": "eq", "trust": 1.6, "vendor": "samba", "version": "3.3.1" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.3.7" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.3.6" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.14" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.13" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.12" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.5" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.4" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.3" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.2" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.2.1" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.36" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.35" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.34" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.33" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.32" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.30" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.29" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.28" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.27" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.26" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.24" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.22" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.21" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.20" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.14" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.13" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.12" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.20a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.25a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.26a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.18" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.28a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.6" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.25b" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.7" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.23" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.19" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.17" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.16" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.15" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.21b" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.20b" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.23b" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.9" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.27a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.15" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.25c" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.21c" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.23a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.21a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.8" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.14a" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.23c" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.0" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.31" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "11" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.10" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.2.11" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "3.0.23d" }, { "model": "vma patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.02" }, { "model": "vma", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "esx server esx303-200910401-bg", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server esx303-200905401-sg", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server esx303-200812406-bg", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.59" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.58" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.56" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.54" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.52" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.515" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.513" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.512" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.511" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.510" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.5" }, { "model": "esx server esx400-200912403", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "esx server esx400-200909401", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "esx server esx350-201003403", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server esx350-200910401", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server esx350-200906407", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server esx350-200904401", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server esx350-200903223", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.55" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "opensolaris build snv 99", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 98", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 96", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 95", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 94", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 93", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 92", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 91", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 90", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 89", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 88", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 87", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 85", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 84", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 83", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 82", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 81", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 80", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 78", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 77", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 76", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 68", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 67", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 64", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 61", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 59", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 58", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 57", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 54", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 51", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 50", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 49", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 48", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 47", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 45", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 41", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 39", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 38", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 37", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 36", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 29", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 28", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 22", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 19", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 13", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 126", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 125", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 124", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 123", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 122", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 121", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 120", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 119", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 118", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 117", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 116", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 115", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 114", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 113", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 112", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 111a", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 111", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 110", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 109", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 108", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 107", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 106", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 105", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 104", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 103", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 102", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 101a", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 101", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 100", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 02", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 01", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.28" }, { "model": "rc3", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "pre2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "pre1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "c", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "3.0.27a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.26a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.23d", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.23c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.23b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.23a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.21c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.21b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.21a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.20b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.20a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.14a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20080" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "message networking mn", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "esx server esx400-201003405", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "opensolaris build snv 127", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.4.2" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.3.8" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.2.15" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.0.37" } ], "sources": [ { "db": "BID", "id": "36363" }, { "db": "CNNVD", "id": "CNNVD-200909-281" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-2813" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "J. David Hester", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-281" } ], "trust": 0.6 }, "cve": "CVE-2009-2813", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "VHN-40259", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-2813", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200909-281", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-40259", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-40259" }, { "db": "CNNVD", "id": "CNNVD-200909-281" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories. Samba is prone to a vulnerability that may allow attackers to bypass certain security restrictions. \nSuccessful exploits may allow attackers to gain access to resources that aren\u0027t supposed to be shared. \nVersions prior to Samba 3.4.2, 3.3.8, 3.2.15, and 3.0.37 are vulnerable. \nNOTE: This issue was previously covered in BID 36349 (Apple Mac OS X 2009-005 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Mac OS X is the operating system used by the Apple family of machines. This allows local users to partly disclose the\ncontent of arbitrary files by specifying the file as credentials file and\nattempting to mount a samba share (CVE-2009-2948). \n\nA reply to an oplock break notification which samba doesn\u0027t expect could\nlead to the service getting stuck in an infinite loop. \n\nA lack of error handling in case no home diretory was configured/specified\nfor the user could lead to file disclosure. \n\n\nFor the oldstable distribution (etch), this problem will be fixed soon. \n\nFor the testing distribution (squeeze), this problem will be fixed soon. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.dsc\n Size/MD5 checksum: 1830 7cc3718e19bbad5aa7099889c6c503a5\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5.orig.tar.gz\n Size/MD5 checksum: 50276407 0f7539e09803ae60a2912e70adf1c747\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.diff.gz\n Size/MD5 checksum: 235342 836141a1924843383cc385e544c933e5\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/s/samba/samba-doc_3.2.5-4lenny7_all.deb\n Size/MD5 checksum: 7952438 630b57065388404b8a9fe3e9e111dc47\n http://security.debian.org/pool/updates/main/s/samba/samba-doc-pdf_3.2.5-4lenny7_all.deb\n Size/MD5 checksum: 6252326 cded2ecbaa3fd39bd215dbb4ec666d4c\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 1945142 a6804ba408657cc4c89c80b0d6e4b8a4\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 1078442 0bedbb5cdb5ca36f52d2e1d1a6015804\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 3273896 082fdadedaf0234b97a8aefc1ef62d8a\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 2572542 ed15d1a7aa9c065986a8e896d63479e2\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 4830106 58ed5cd28d4c43d07195d013cf25553f\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 1461944 71adea7a3b47b65f8df4f3dc5efc4422\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 81488 d521efbda414cf6d4a588873442eb987\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 5730522 cca571adc80b833e7d9c45d5dd7fa103\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 637762 b526ea1ed9ca51d132a7685ec8320eea\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 1333234 36e35a3c252fabcfd2ec0ba8407323ca\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 3736262 9dc1a726efda21fa112ef2641c9b1f6a\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_alpha.deb\n Size/MD5 checksum: 6953202 b3e8de8b127bcd1f5dda4db61ed44b20\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 3274278 b732915df239ea1a9fff196250d6d383\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 1493684 460ed93756df58adfa57870d06c9aaff\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 627686 70379a8e6ce3b5d6de6af6b895d30619\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 3728204 ac7fb1f7d07628d0452d10e62b2d661d\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 1083940 5ca50cf6abd792b51e501f846f782231\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 5646144 09130baf353097710d6df8a6586875d7\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 1953358 e7c3f85d21b94e62baf0bc5849d8a7ed\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 80522 507bc24d176289793eadd28f4623e331\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 1358910 6ec7ccedec85f92e175b99c6abfb76ba\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 1995586 be70b626e522a6d10947717cc4dad784\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 7007462 b3a959d7475adb2d8aefc1d590690744\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_amd64.deb\n Size/MD5 checksum: 4775388 b2adb39f3d76b691a747126efd40452a\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 561128 0d9cc7d736f2ac3af0037fb0538885bb\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 2398710 a2a88432efcb034fad0cfc36130938f6\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 6177100 b465429510298d684d16f33d977ec1c3\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 3353238 d7e4a1fb9ecb639471baa485dc629653\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 79216 da72ebd5740459cd44c6d5735883f203\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 4267492 62425ac8d76f5879b900622026883d94\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 1315868 8b3019c57cfeeb28509ca96f7d0358fa\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 972222 1197d9bb33cfb181d99f03102b751cbf\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 5041464 6db94424b23399cf83de0ae1968efba0\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 1203924 f8a743cc5f4afb87f8b9cb883252c6f2\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 1817072 72fddd524748b9e9206c135e81c698dc\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_arm.deb\n Size/MD5 checksum: 2892294 b43b907010b9373ec7957a570d9a80ec\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 2910452 fd7f3ad0731784dccdc5b3b467513469\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 6214560 94dff8a518547e92fb165c02dae9baec\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 5070850 b4a9ac34be34928672ce800c899ac042\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 981922 ae00524832d05f9aa8c06686c9e4e461\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 1323868 be4570e7c8720bf0c756b4eac3cd3fe0\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 3372252 012baecc35e1becc8a07d81adc262d65\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 4294422 0c6add94f7e453817388fa9e529b82bd\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 2424800 db72d33ac4229f163053c1f4ea18480e\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 78816 d0ac45bb3404ac4fa9972bf47ec91cac\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 1823568 48f417418296b035f611572d4504ffbd\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 1210432 d58cf1719fc208e76cec7c28cb594da7\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_armel.deb\n Size/MD5 checksum: 564066 43f4da7801d6e972fae31ce287ded998\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 2067740 1f3465310bfa420ca5d3dca47fb61876\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 6687014 bd2920b6f871c5cfc573454993b99bd3\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 4653108 91139f0c545ded0f434912e577cc655b\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 1375386 2f9657458e85625ffa4f762df7ca9a87\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 80862 32248cce30e50a58171439955e8c1b31\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 5501106 2c9166906405f03cb05d509b871ee48b\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 3177446 f061d9d8f7e5276ff6f6bf98ecea456e\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 631654 1dd17d4d9edc8fc60707db89643a8aea\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 3610032 ea72fc29881895beab6c09e20dce4eb9\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 1046340 b118ec013c5588b8baaea5d1b0e920a8\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 2229186 b1f09642dd40089211dbaa22d9e234fd\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_hppa.deb\n Size/MD5 checksum: 1412786 3ffb5d639b595a3af2d1661439f7559d\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 984354 610ff7af9bdec786dc66dfc71e6d906d\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 2930762 16cc9438cc5a7bac68f842aaff01cb44\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 6302570 8508f2837d10ed9e791690764c887482\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 2081416 a97abc97a1ccbebc475cf94ab984fac0\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 561714 b61348ec0f3adb19990550cab9b7e40b\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 3405124 904fba778279f57af680c3a25d316c89\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 4295250 e783fb6625c27e5d4dbdf0b5072345db\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 78984 0a4c138021591e75544c95a70a79f5e4\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 5067188 9b7a2c22ef8ebab7db2da88e77d61607\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 1825116 d70821ed19cb8118f76529c844c967de\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 1199768 f33cfc38a35e53f9a278279d10cb9296\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_i386.deb\n Size/MD5 checksum: 1349920 a34c0d26610af3d6a5e8c0c9e35f6acf\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 4386438 ec0ed107b01d00462e6a4dd9fa914a6f\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 5832230 d73c656dac14065b3a1f13201510eb20\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 1724092 9b5c69cdc6911c755a8e6b12d048d1ba\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 84004 bc0fe8f98f03b5d665810cb5ade516e9\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 752072 c462e06b2ff50d6abbc6fa5ba6c14dba\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 1561116 91986263af0fd80f2a8d220e626ea4e9\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 8294752 bfea15cf71e6f3503e8601b7b7a51ff4\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 1939328 a3d3f802ed54267a93a61eed49d48b7e\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 2400926 961af2d58aeff2eb54b6316b56b0d71b\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 1280080 63385632efbd6d173e452b75ac295e7d\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 6933470 666a61b68183f3afc017cb3658d25049\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_ia64.deb\n Size/MD5 checksum: 3915410 a7ae5b73317aff391dbfffe447ee8958\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 2507514 c8d996cba28f6d76d187774f844b01aa\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 4203042 d48c2d45cd762dc2bad73ca9c089d3c9\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 572688 4c689c9090845e6784d96eafdd1d1dd5\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 1205342 92c7d350a6958c60b719dc1bca25e23c\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 3238756 9c2d7e67ffcb7f6f9010e2a4cf3e5e16\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 942044 b994c97405ec4963b68189a0ba00067b\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 4998666 1648dd4cfec7bc14cbd41320b44fbb16\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 2809438 f4ad77583575756d14629fd98c8166f5\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 79288 10a8cdeed703948d1dd5e836897558f1\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 2182258 5183531629f1c99dd71f253832bab233\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 5840974 cb82df1024f5c10770ac98afe89e48a3\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mips.deb\n Size/MD5 checksum: 1093592 8e55a6342da60f19c3c95a55a1d90164\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 2128338 f27eefe417a4831ed071ee2a34949e47\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 569280 584e1b162cb0452b814d34aa618d9b85\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 79204 69f192c04fa40eb5e2fc37c1cdb1b0ac\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 5801134 d3791aacacfcadd4caf909dd9b62fe31\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 1081720 b19e32963b224825b1f6335e28bc6d6b\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 2792976 e3d2772a8cf2274a26190043d0c9694a\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 2387806 e5f53727f8ccdca5bfb82efbd5601c7e\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 4967334 3dfdbd6e944b31808bb38bbe3ee3fe35\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 1196484 bc9d17cd36558e526efd2e3870f2b0e4\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 3219234 d4615fd079aecae1ed4753c4449aea75\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 4177874 10909deb34148f33c2a92ecb6cfd8c72\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mipsel.deb\n Size/MD5 checksum: 936880 1e742c0aa5a77a995fa174a9b02913c4\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 2988566 40620c503ca952eeeb73bde777a14435\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 6294542 feab7c9b74b13b06b6977d637623c728\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 2079372 4886a2d8d7664280dae64605c891996b\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 1712666 75b337ef8fb0e52f71cf2e9b18faa1d4\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 3423452 da023922a04344c534ee88e0e0292900\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 5187664 0ddd64379049fadd254da0045e04d307\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 595048 b08157624bc5ebe37b5a2c343649bb83\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 1333642 98613e2a5c876333295cc0aab31ad250\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 989426 e1b15a1a53be2bd09010c1dd0eeddcf8\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 1239864 1aafcfc867e23a3b84f58e29f5a4b163\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 4403350 c2b90fc3fb94dcd324f9da7a38a7c878\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_powerpc.deb\n Size/MD5 checksum: 80476 3ac690ddd20c773e1437d21572c37a2e\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 2061206 694599e2dae140a04c53be168ebbf163\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 1389672 25b0b8754be83bae0984de459f7cf319\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 641924 989f56ac5c323f74b34512dcf48412a0\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 1935682 032e63baf547b194e2af89da342be617\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 1258028 5884f69e4c3fc4567c8f2392b4cae88d\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 4740858 01348d4fe49f9f8b07eb98b77a447c4d\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 1056846 85573ee68987c713bf2abf1c676bcd6a\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 6706474 c2cd5c961d23f7ec513b2cb0efa469a8\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 5647644 c123e43888dace888b100f4d61cef627\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 80832 c96484d5c2588fb90a23df5869463554\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 3204582 0254ff9259bae547b7d8673124473e19\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_s390.deb\n Size/MD5 checksum: 3650302 0716bdcda1c0b080e30fbc2b4af03e6b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 1202198 76ec9e4b183e72139b216321ef0dbc6f\n http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 975366 ce9edebb6cdbbfce4ed44dc376960d3a\n http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 4322338 398acf0f34e81b674ec8cf4149bf4534\n http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 2924672 52a6813bc6e557daa5f2ec523942ebcc\n http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 5116574 63e4f4faadf3223fdd904e546aab6a22\n http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 3372416 73b1333d568d87529e8d3072ebd4c509\n http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 581590 2dcac90d984a7b08083be093befa1472\n http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 1303976 731b1a1f9a65e1ec887c0fbdfcc867d3\n http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 1996180 13724133b88e237853164fedd89c356b\n http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 79152 1ffe88781e928339aa16c594f9f224f0\n http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 6172106 37c0d2de6d73127751cf1670ee468944\n http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_sparc.deb\n Size/MD5 checksum: 2020578 f161d329079cb0df6cbc30ed97191e15\n\n\n These files will probably be moved into the stable distribution on\n its next update. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2010-0006\nSynopsis: ESX Service Console updates for samba and acpid\nIssue date: 2010-04-01\nUpdated on: 2010-04-01 (initial release of advisory)\nCVE numbers: CVE-2009-2906, CVE-2009-1888, CVE-2009-2813,\n CVE-2009-2948, CVE-2009-0798\n\n- ------------------------------------------------------------------------\n\n1. Summary\n\n ESX Service Console updates for samba and acpid packages. \n\n2. Relevant releases\n\n VMware ESX 4.0.0 without patch ESX400-201003405-SG,\n ESX400-201003403-SG\n Notes:\n\n Effective May 2010, VMware\u0027s patch and update release program during\n Extended Support will be continued with the condition that all\n subsequent patch and update releases will be based on the latest\n baseline release version as of May 2010 (i.e. ESX 3.0.3 Update 1,\n ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section\n \"End of Product Availability FAQs\" at\n http://www.vmware.com/support/policies/lifecycle/vi/faq.html for\n details. \n\n Extended support for ESX 2.5.5 ends on 2010-06-15. Users should plan\n to upgrade to at least ESX 3.0.3 Update 1 and preferably to the\n newest release available. \n\n Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan\n to upgrade to at least ESX 3.5 Update 5 and preferably to the newest\n release available. \n\n3. Problem Description\n\n a. Service Console update for samba to 3.0.33-3.15.el5_4.1\n\n This update changes the samba packages to\n samba-client-3.0.33-3.15.el5_4.1 and\n samba-common-3.0.33-3.15.el5_4.1. These versions include fixes for\n security issues that were first fixed in\n samba-client-3.0.33-0.18.el4_8 and samba-common-3.0.33-0.18.el4_8. \n \n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the names CVE-2009-2906, CVE-2009-1888,CVE-2009-2813\n and CVE-2009-2948 to these issues. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201003405-SG\n ESX 3.5 ESX patch pending\n ESX 3.0.3 ESX patch pending\n ESX 2.5.5 ESX patch pending\n\n vMA 4.0 RHEL5 patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Service Console update for acpid to1.0.4-9.el5_4.2\n \n This updates changes the the acpid package to acpid-1.0.4-9.el5_4.2. \n This version includes the fix for a security issue that was first\n fixed in acpid-1.0.4-7.el5_4.1. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-0798 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201003403-SG\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n ESX 2.5.5 ESX not affected\n\n vMA 4.0 RHEL5 patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX 4.0\n -------\n \nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-195-20100324-069\n238/ESX400-201003001.zip\n md5sum: c7c0f287d5728289fe2903be48d8d501\n sha1sum: d90badd89247ccc96a02001b6d697bf39fad9e7c\n http://kb.vmware.com/kb/1019833\n\n Note: ESX400-201003001 contains the following security bulletins\n ESX400-201003403-SG, and ESX400-201003405-SG\n\n To install an individual bulletin use esxupdate with the -b option. \n esxupdate --bundle ESX400-201003403.zip -b ESX400-201003405-SG update\n\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2010-04-01 VMSA-2010-0006\nInitial security advisory after release of bulletins for ESX 4.0\non 2010-04-01. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2010 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFLtPVKS2KysvBH1xkRAr7QAJ9fmOGXceihgXteCto/P0/N4FOYpQCeNU+6\n9mPchO6g2qdEqzK4oDoGbl8=\n=focv\n-----END PGP SIGNATURE-----\n. \n\nRelease Date: 2010-01-27\nLast Updated: 2010-01-27\n\nPotential Security Impact: Remote unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running HP CIFS Server (Samba). \nThe vulnerability could be exploited to gain remote unauthorized access. \n\nReferences: CVE-2009-2813\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP CIFS Server vA.02.03.04 and vA.02.04 running on HP-UX B.11.11, B.11.23, or B.11.31. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2009-2813 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve this vulnerabilities. \n\nHP CIFS Server (Samba) vA.02.04.01 for HP-UX B.11.11, B.11.23, B.11.31\n\nHP CIFS Server (Samba) vA.02.03.05 for HP-UX B.11.11, B.11.23, B.11.31\n\nThe updates are available for download from\nhttp://www.hp.com/go/softwaredepot/\n\nMANUAL ACTIONS: Yes - Update\nInstall vA.02.04.01 or subsequent or vA.02.03.05 or subsequent. \n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security\n\nPatch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a\n\nspecific HP-UX system. It can also download patches and create a depot automatically. For more information\n\nsee: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\nHP-UX B.11.23\nHP-UX B.11.31\n=============\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-MAN\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.02.04.01 or subsequent\n\nHP-UX B.11.11\nHP-UX B.11.23\n=============\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.02.03.05 or subsequent\n\nHP-UX B.11.31\n=============\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\nCIFS-CFSM.CFSM-KRN\nCIFS-CFSM.CFSM-RUN\naction: install revision A.02.03.05 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion: 1 (rev.1) - 27 January 2010 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ===========================================================\nUbuntu Security Notice USN-839-1 October 01, 2009\nsamba vulnerabilities\nCVE-2009-1886, CVE-2009-1888, CVE-2009-2813, CVE-2009-2906,\nCVE-2009-2948\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n samba 3.0.22-1ubuntu3.9\n smbfs 3.0.22-1ubuntu3.9\n\nUbuntu 8.04 LTS:\n samba 3.0.28a-1ubuntu4.9\n smbfs 3.0.28a-1ubuntu4.9\n\nUbuntu 8.10:\n samba 2:3.2.3-1ubuntu3.6\n smbclient 2:3.2.3-1ubuntu3.6\n smbfs 2:3.2.3-1ubuntu3.6\n\nUbuntu 9.04:\n samba 2:3.3.2-1ubuntu3.2\n smbfs 2:3.3.2-1ubuntu3.2\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nJ. An\nauthenticated user could connect to that share name and gain access to the\nwhole filesystem. (CVE-2009-2813)\n\nTim Prouty discovered that the smbd daemon in Samba incorrectly handled\ncertain unexpected network replies. A remote attacker could send malicious\nreplies to the server and cause smbd to use all available CPU, leading to a\ndenial of service. A local user could exploit this to use or read the\ncontents of unauthorized credential files. (CVE-2009-2948)\n\nReinhard Ni\u00dfl discovered that the smbclient utility contained format string\nvulnerabilities in its file name handling. Because of security features in\nUbuntu, exploitation of this vulnerability is limited. If a user or\nautomated system were tricked into processing a specially crafted file\nname, smbclient could be made to crash, possibly leading to a denial of\nservice. This only affected Ubuntu 8.10. (CVE-2009-1886)\n\nJeremy Allison discovered that the smbd daemon in Samba incorrectly handled\npermissions to modify access control lists when dos filemode is enabled. This\nonly affected Ubuntu 8.10 and Ubuntu 9.04. (CVE-2009-1886)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.diff.gz\n Size/MD5: 161616 0ad9aaba168245042d1489fdcdd5dc42\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.dsc\n Size/MD5: 1203 e54ed933c8b093c77b7aecaccc1650ab\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22.orig.tar.gz\n Size/MD5: 17542657 5c39505af17cf5caf3d6ed8bab135036\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.22-1ubuntu3.9_all.deb\n Size/MD5: 6594720 714f26b307bf9c1d81392ef89dd57420\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.22-1ubuntu3.9_all.deb\n Size/MD5: 6902292 116d5fcbf539e39460c4de1a03a2e5f1\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 427020 eac8d7f26dbbe0a51eb6dd2089d5318f\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 112902 78153d8ae792d0dad9913142ac80f304\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 798804 51db5cb3445e03ce20bc01df763626f0\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 5974858 2984a44edeff38950c8b117ee5dfc50d\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 2415334 5a7e0073ee7714fa816d528ec7015e98\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 11893670 e9a72bdd6da691c06755694781c28cf0\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 3405114 c3db6785e7e379912107194b85a6c4c0\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 4042974 5b6d291f233ea349113f188c8b602922\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 450162 973bba455c72ac8f68c5266f4f6962c5\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 833738 7a32896e5bbbed676eb7d670b7b5c913\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_amd64.deb\n Size/MD5: 1931042 3da6192d4e7d101613c5af8b3d29cddf\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 366694 f14155bac141ad7f941ba03e393c5270\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 112902 967c4537a0883400f4ee836d32b1acea\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 683712 002366bd9b55bd6a9e5b01482a03e532\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 5068740 85a5168913d149757470d9604a132b8c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 2078578 5eb6ccc70dc94c0f04879d46d047b52e\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 9811828 e6daf862bdf89a5b2ae0e10b6ec7d46b\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 2852250 ce15a3ffa8bb74c1668e2e84af25f395\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 3353974 b359d873da6d8f2fbefb017c56a90d69\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 380190 25564c8fcbe3748d89352c3889224a38\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 711802 a3ea954b28c3b650e2a48672d6944205\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_i386.deb\n Size/MD5: 1609834 7b3072248ab3b89584205aa234ccf555\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 410852 ef7fe6cfe269a839e44f3cf538d4ae38\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 112916 90aeed1dcdfc40442543b79b4c960027\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 777048 32b63354cd4ea69407f715a690f51856\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 5693046 1903d9ec97fc80bf7ec844f0840b41ed\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 2359372 18c86a2b1c6ab25a370c2cdbd6661ead\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 11903932 d04b1ea8aee57ae0df5c29756c2c3b5a\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 3334618 7667bd29d3beb55a97e5a3b5577ecd41\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 3942780 9d951c0722867033b8281e1866fcba24\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 443270 b7f93c04656c39aa3dcbafc53ce0fa05\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 814458 10be46698881dd3c2cbc9a55a34d214d\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_powerpc.deb\n Size/MD5: 1873756 4d919e6bf376e316a6195bfe5aae1a97\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 389762 dcc58f618c5dc2199ff041aeedd71d98\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 112918 27c0500abe2141de9472fc5dcb379a97\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 730528 fd413b1753a90c741cdbf767cf4c6a4b\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 5427026 af95ac20b0047a3fd4c640d8536b950a\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 2145644 843c984664f3e644252ea6cdfddcb7d4\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 9723658 2639550c026db54b4bc5686e896dd510\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 2993030 8260ac9ace47cc8767b6935c2b3ef5ec\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 3508094 5c0ac997e1d96052f31b24fd1188a26f\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 400114 c4cef7889ece3a02aa7b59dd56b7a544\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 737168 42111d78eb3502791890f93c18d9b3bf\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_sparc.deb\n Size/MD5: 1691634 30bf9470299d7414a3874c2a8adae78d\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.diff.gz\n Size/MD5: 231391 7e2af7f7d745cc77c330ee843679d8ca\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.dsc\n Size/MD5: 1586 2e4a432be1d531c58d1c120ffcd3a19c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a.orig.tar.gz\n Size/MD5: 18172643 59754cb0c19da6e65c42d0a163c5885a\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.28a-1ubuntu4.9_all.deb\n Size/MD5: 6622338 9380d43f5191a37cb32bcbab1bad7ae6\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.28a-1ubuntu4.9_all.deb\n Size/MD5: 7009210 cc331f7f2efb8e800bbb8762b37e25e0\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 520546 b4b1240a3ff4d40a83f78a07c443c0f3\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 1292542 3bb97eca27dadd4722adb044a40adee5\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 967892 bc14c1047fbf66c1925e0c882ba92ee7\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 3058802 f54479769002e9afe5e91ee46ae5ff41\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 20893780 4edd6952575bc8c73d1d36d41ecbb479\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 4194456 879f5a1f38a4fe9578a8a0493d522162\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 5304436 3eb8858a5b14da4623dd48bf10f9fb73\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 430122 fe85b84ec13ae940f9d2768464d709a4\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 1048832 f6895c2fa5b41dbd8eba7d88194abf41\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_amd64.deb\n Size/MD5: 2473112 74df91dbdde172e3899b100652695a45\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 472252 15042a9ebf034ea53ba563c791763385\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 1201976 727bb81955ba29c4c41bf874c47d14b1\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 887392 ff28ffd04701e889014f83c492e8a992\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 2840618 9bd4fdf53cd7b0b0b3bb4b3ec434fef9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 20216796 ced1db63e3cb543459c4cdb7f10a1bdf\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 3840538 2cd8ab43090b315d116894170ec96d66\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 4863560 3898e31536f87d7dde65502d17ce05b6\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 397132 250691215f69c151186945b5a55b0b98\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 974478 dd38262a108a87c928dcc50f3389a3a9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_i386.deb\n Size/MD5: 2248406 896ce555ed798423eeb88fff50eb8b30\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 463234 08b9ee8f8361646792eb439ae045269b\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 1168374 2e2979e9f98c9b5dd73fb6c2da0911df\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 864522 130273d8f0f9ad49e0c383ef52fd6e1d\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 2779576 c0d8f3966307a5858d880d033603b3f5\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 20585618 d36b13bf28a9a3fc131c0f33b152d47e\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 3756770 eca1116f745d9766285c0d0a74d5b644\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 4734470 762b151daed66156092d163b0f406c20\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 390026 dbee68f037d577cd5439719c7fb92a41\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 951286 38e35eeaf91c45ca56565219149abd99\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_lpia.deb\n Size/MD5: 2195544 d64ab228f0342e4d67ec3b5f20216018\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 515832 2ad077d63b6144cf907ab9988baf0139\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 1200004 bf7ae58acb99cc3db2fab99638c95fa9\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 956626 fda0b121c55858f6b66bcacb2b0461f8\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 2990960 bcb29d58590b755074a365c552136c0a\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 21182522 2c0803fafa6fbd40aa3e104ba56bbc0d\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 4126290 ccf21a784b39e047c6dc194755fdca7d\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 5163400 74bd882877f5523cafc680de256290fb\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 431514 959ff71f764937096d6f15a655dfaee6\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 1018106 2b184bd834d898febb1ef227bfd1fb90\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_powerpc.deb\n Size/MD5: 2420168 d39a44b7f9f8e154ad1c6a7cd7c47744\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 474682 4e2ebf556bf2aebc6ba6451f28c5b880\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 1264254 0e1762140c135589e5a82bb690bd7770\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 882412 8923f26cae63e096cbc88e036851486f\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 2780260 1538097139e3853e5123c022bb0b0f1c\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 18529580 59a25ca374c053660116dce03011abea\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 3802920 8fc30eccc623c180c4fc162102867fe1\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 4742870 aa4f92e69ad826b22fa1946e68e987da\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 396682 60fdbb3079527176c177305bb648ca07\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 948132 18f33ffe44b9d32f4b7cc8d8885b3dc1\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_sparc.deb\n Size/MD5: 2217900 bb8577eb34a3226359c58667ec2a9afb\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.diff.gz\n Size/MD5: 236931 4f9651b8fc38ae5775cc57b2d987f44e\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.dsc\n Size/MD5: 1902 f281832cebbef598586013098bd67400\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3.orig.tar.gz\n Size/MD5: 23704996 c1630a57ac0ec24bc364c6d11c93ec35\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.2.3-1ubuntu3.6_all.deb\n Size/MD5: 6261910 503b40ccc2f657eeb7c25bac480c4bf6\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.2.3-1ubuntu3.6_all.deb\n Size/MD5: 7955234 412fd71fd346e66011f76a5af0466398\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 639534 bbbfbbead71027d2419fcb27fba42407\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 1969252 a01c75db248048dddac69a59a81c7f89\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 1370904 0e1727442db6c636569c25822d1fdbf0\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 89560 6603c0860d68ad2819d718c6d05ec5d4\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 3817612 7784145651faa822dc74d0976a99338c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 1994386 6a019c4493229ae31edfea3ee46cb71c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 5805124 d1c605957d71007be0fda1a15694d518\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 4909508 1e5b668561555630f24091af0cd6d4e5\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 7176252 7aa07ad7649a4446681b76847e5f5cb7\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 1530810 d6ddcc2f344f71c83f61b9ecb7b0c5a7\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 1113428 0379fc7d057771de7b437fecfc7966e6\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_amd64.deb\n Size/MD5: 3351366 ee45f0cb769c6c28f8a347d34d338d7e\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 574924 506af0e56dff7d0fe7ab51ab469c47e6\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 1845352 e6ed7ca7f84020e149e808fe64311cf3\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 1218372 72aec547fa38b0a064bf0e60466fda42\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 88078 ab33ce6e5cefa515a699aca9cdc461e9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 3461470 17ffeb64ecd64f184e97a943c5eb9e6e\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 2078640 3c519d38299e6fdbd07f4f4d72aef95c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 5163590 5222f9aea0fdf9a2acc5d95318948284\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 4369460 34806faae06578a1051d568c5cea17f9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 6405268 02e19a3061477a8811d8d25709fe53e4\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 1376806 d13a79928b41c7973a1a0c1ba691a722\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 1007482 eae4a6678ae8130648a5fb572b0c8998\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_i386.deb\n Size/MD5: 2977186 b4ee501767e1e5a49741ccbda78425d0\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 554422 ff03551a483e90441db25c4c7692cd95\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 1769968 6ec919b02183c89b9aa80134249e4b52\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 1161338 2516d6d888b98b3bd8a3b6d74a5937a6\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 87506 38b8b5788656a29cb0db8a13cb8b9480\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 3330112 84aac2e247aab6dd9efb162409f0aadc\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 2071010 56f8a2fbd9e80523ef4912c691676adf\n http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 4952144 af73024709a58ee64f805f77077d1364\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 4199086 a1f7386a5d5692d4b1e995ecd8f3bb87\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 6137958 e0a1a5d5aec37facd2c1330cfb56dfd2\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 1318062 bf22cc094c4e89d8770fd845e855a387\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 969198 83f81cfc7d9ee22b599b505ba3ae3f05\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_lpia.deb\n Size/MD5: 2857452 2b48cd916e54e46d5f0452303d3851d3\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 607408 559831ff717451c998e29d4eddb3e034\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 1731182 bd5a801be1d73c5ac033548987dde264\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 1255860 6efaefbeafe04c3103d84f2c105d1872\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 89508 9c3081f940474a1f415678746f6243f6\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 3601302 a0ce49b8f3aab2a28cb22765b063694c\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 2059040 92ad3324c83002e8b9783960ea40a036\n http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 5477608 0e38befb17ef64fd0ced6d2643dbf8da\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 4641844 d31adf2bfafb586243e2faf535953e42\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 6659150 956f64674dd5cb7bb3f8bac62895d24d\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 1418796 8df76629fdc1fc014f9abfa1514540cc\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 1046932 6fdfbbf2b39c0b4962f3831538863e78\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_powerpc.deb\n Size/MD5: 3124852 6c04f13595d0573d71cde5987ac264dd\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 593506 b4870d6be6ef7a61ed6c5a2e4aeae16d\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 2008990 878258bf3efa14b921dd567103a80deb\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 1216706 c488460e14273a93f0540c84c3248cee\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 88094 3a6d77a02f0e6acaba23e4b9549e69b8\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 3503522 8ecc0f2c8d5f4cd8e4e0c796ac5722b5\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 2008706 4fff798d96bf44cec97af54ca04db241\n http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 5332248 9d183a23e7fd5f7f3994dcb711a37e97\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 4505892 c62a9e2bc675ce3649466cc130add2fe\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 6450016 54ee993bca2684d4e01b9f6f5a44c85e\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 1372100 5aee6497bb5977e8e307157daba0c230\n http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 1020422 bfdb2375fc15aef8e2c9fe3a57c1af02\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_sparc.deb\n Size/MD5: 3030996 c0ca89ffac33688bdfe227fe26019fe5\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.diff.gz\n Size/MD5: 246744 ae710e82bc844bc0784713c356a65fe0\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.dsc\n Size/MD5: 2101 c340588b3010c9b5a7f33001a653ffb7\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2.orig.tar.gz\n Size/MD5: 26058163 5c5178ea2c5d9bd5f6569285f2e0e6d7\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.3.2-1ubuntu3.2_all.deb\n Size/MD5: 6710652 9d2f3fef5b10b37a00c35671153b3632\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.3.2-1ubuntu3.2_all.deb\n Size/MD5: 7994730 28f301eba9f060eea631aff3a1c263c2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 646652 2d5d4e46c0aea5af01fe5e9c6bbb9b28\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 2163380 c9423c1d10a0c24318882bbf169c824b\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 1508304 23c2a769c2998d346a712858cfff8cf9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 98292 b7c4155820c63d283d503927f9cee94a\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 4467650 c0b7ef8b7211281f0db3949011abbea1\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 36711768 99fd9b5afc6a4323e86e846cb72136b9\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 5071440 dc9efb1ace97ea837b6114f0dade6322\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 9018812 3a5e01312117b39737a09978ba9f9e43\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 1688934 59e11957943a573564aa166d4b018d3c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 3895728 9eb9988344d07744de3eb780b4c42b4a\n http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 5713268 b9146cd614816390dcae0cc91683221b\n http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_amd64.deb\n Size/MD5: 1542412 0c67889bbb7e28462b2124440ab654ca\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 582222 0219aff733081399d32448732dd96294\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 2032960 750ff75ee3478437edf9e1d19e782e27\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 1347184 3775216596791dc048b765b89abb05b3\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 96638 d425c4783b30a1c0ad46407cd1f04dc8\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 4060442 34801ccdac63f1bdf9b10b637b1d4f6e\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 34984314 e8551db86917575071e55762d87d3b85\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 4527948 12e6be455b45d0ce4245ab1105a5f96c\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 8097728 251cc0883c670ee19edf0078a058c852\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 1521034 e3f8b5995d81ba1f6c968ac32fc0d0be\n http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 3481570 a29f9da468b535c2da5e9923010d1d6d\n http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 5099016 362165caee8cd0bba16258f66c073cc6\n http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_i386.deb\n Size/MD5: 1400948 84221b1da74bdb5f5787f68de8952355\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 560958 962b835eefa46cc6bde4832d0e88121f\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 1952880 f9f1fb19bb809aaa6d3aad7242a4bb72\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 1283570 af16ecb6dfd504c40dc56317b34ce9d3\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 95956 a768287e6b93040ef2cb35ec8e7d7d41\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 3904320 fc222ca31831d73c84faa7d1e2490974\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 35290838 396e2a07747efbc6823f6eec6f7edd53\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 4346314 6297c298aed6f3a4de613d54a1dcf749\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 7754410 c48267678450b0603139bc08e1edbbaf\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 1456666 f9b855b88c6a45b04e707a18aa55b9e0\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 3339424 5ce5bd4288830a8300a44b5c52768cf3\n http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 4890862 dd221351f63783646d4e4f22d678c055\n http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_lpia.deb\n Size/MD5: 1346736 d51baf9446d9fd010828a0131c1d3267\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 614320 8da8875e3c2226c83ecc5a40d97b2cb2\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 1900044 953213cf62382b4b8b3a45d3f7def0ee\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 1382664 7c6ed21ea30b0ebcb0462ceb1c3f8e16\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 98086 c0f91f3844450ae41d6e3b0115f20591\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 4200232 98576bc60ab7737cb5bb547f29e1a5dc\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 35738340 9d638bf8c1ab59847995b9ca2c55d56a\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 4804652 8a7d4638dac9533316b1f0a020dccd3f\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 8333880 e1b4a75d2ad6a9725584243883312f3e\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 1565914 aac094d4e42580986c2056c2256209c5\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 3630424 7b6143e9fa2e47c716023e3f37d92768\n http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 5398448 60faa062e6ad2f7276f61efa06bca513\n http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_powerpc.deb\n Size/MD5: 1436246 32c9c1f616da971f6b149630da05ab30\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 600048 2552f5b27c823718c0862c5b76ca9f63\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 2213024 65ecad7035168477e207bbc5ed1d0c29\n http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 1339606 cf15ae0ff3b54429d4f66917b5d406ed\n http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 96454 a7c4796444e2146c181a9222c7710970\n http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 4080446 b1728440e3d6a92683d620f398b496c1\n http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 32778340 0ca389ca9b68bf428c7e94ed23603353\n http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 4657980 997f813c1e1da2decb4c84970c72dd77\n http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 8060996 ee6756467677a4fc46fab626b8be0396\n http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 1512774 2ea893dd60671f3cac6c24fc42db131f\n http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 3513456 2d5d634bd732ee034f0d10239bb26944\n http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 5250174 fd91190a66a41ab02deb6741b2035559\n http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_sparc.deb\n Size/MD5: 1395758 225e6ebcb5b001906b5014af4a40c3e3\n\n\n\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSamba Information Disclosure and Denial of Service\n\nSECUNIA ADVISORY ID:\nSA36893\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36893/\n\nDESCRIPTION:\nSome weaknesses and a vulnerability have been reported in Samba,\nwhich can be exploited by malicious, local users to disclose\npotentially sensitive information, and by malicious users to disclose\nsensitive information and cause a DoS (Denial of Service). \n\n1) The mount.cifs application does not properly verify if opening a\ncredentials file crosses the privileges of the invoking user. This\ncan be exploited to disclose partial file contents by using the\n\"--verbose\" or \"-v\" option and passing the file as credentials file\nto mount.cifs. \n\nSuccessful exploitation requires that mount.cifs is suid root. \n\n2) An infinite loop exists when processing certain SMB requests. This\ncan be exploited to cause a DoS due to CPU consumption by sending a\nspecially crafted request to the Samba server. \n\nSuccessful exploitation requires that the attacker is authenticated. \n\n3) Samba does not properly handle /etc/passwd entries with empty home\ndirectories, which can lead to access to the root file system and all\nsubdirectories. \n\nSuccessful exploitation requires that an /etc/passwd entry with an\nempty home directory exists and automated \"[homes]\" sharing is\nenabled or a share with the username of the affected entry exists. \nhttp://samba.org/samba/download/\n\nPatches are also available:\nhttp://www.samba.org/samba/history/security.html\n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Ronald Volgers. \n2) The vendor credits Tim Prouty, Isilon and Samba Team\n3) The vendor credits J. David Hester, LCG Systems National\nInstitutes of Health\n\nORIGINAL ADVISORY:\n1) http://www.samba.org/samba/security/CVE-2009-2948.html\n2) http://www.samba.org/samba/security/CVE-2009-2906.html\n3) http://www.samba.org/samba/security/CVE-2009-2813.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Additionally for 2009.1\n the version upgrade provides many upstream bug fixes such as improved\n Windows(tm) 7 support. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948\n http://www.samba.org/samba/security/CVE-2009-2813.html\n http://www.samba.org/samba/security/CVE-2009-2906.html\n http://www.samba.org/samba/security/CVE-2009-2948.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.1:\n 4f552578709de0466d922e8a0759f8be 2008.1/i586/libsmbclient0-3.0.37-0.1mdv2008.1.i586.rpm\n 9bb222210c3a99989ddb6c3479c8cd6d 2008.1/i586/libsmbclient0-devel-3.0.37-0.1mdv2008.1.i586.rpm\n cecadda3b37593746894536d2392d5c1 2008.1/i586/libsmbclient0-static-devel-3.0.37-0.1mdv2008.1.i586.rpm\n 7edfbf4deea7b57e7c7db53c85d62a41 2008.1/i586/mount-cifs-3.0.37-0.1mdv2008.1.i586.rpm\n 7a4a8d4577893ef1a0b410d1d2a1420e 2008.1/i586/nss_wins-3.0.37-0.1mdv2008.1.i586.rpm\n 236a200f0fea567b71b2fc6b2ab76d01 2008.1/i586/samba-client-3.0.37-0.1mdv2008.1.i586.rpm\n 1ab41b7a86e1100ebfc0f8a3f3c7585a 2008.1/i586/samba-common-3.0.37-0.1mdv2008.1.i586.rpm\n e26405b50094478abf9c8e6f0cecb4d1 2008.1/i586/samba-doc-3.0.37-0.1mdv2008.1.i586.rpm\n 92c5ee7aa8a23df6f8e63e721d6cd1eb 2008.1/i586/samba-server-3.0.37-0.1mdv2008.1.i586.rpm\n 4192000a9c943240cc49285172a4365a 2008.1/i586/samba-swat-3.0.37-0.1mdv2008.1.i586.rpm\n 4979847252345d54d1ca4d57f2eab2f7 2008.1/i586/samba-vscan-icap-3.0.37-0.1mdv2008.1.i586.rpm\n 47272746a7af49923bd4f7599905a533 2008.1/i586/samba-winbind-3.0.37-0.1mdv2008.1.i586.rpm \n 814b5cbb37717cfb25d86de35231c436 2008.1/SRPMS/samba-3.0.37-0.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n ced0d1b4aebfc1dcf3640e2d0eb22668 2008.1/x86_64/lib64smbclient0-3.0.37-0.1mdv2008.1.x86_64.rpm\n 9d4efa92699f9cfa9cb67cbfc8e0bf80 2008.1/x86_64/lib64smbclient0-devel-3.0.37-0.1mdv2008.1.x86_64.rpm\n b951dd85f7b5520615a8bfa9efa94e15 2008.1/x86_64/lib64smbclient0-static-devel-3.0.37-0.1mdv2008.1.x86_64.rpm\n c989e22b38dd6190655a6a147d9b4320 2008.1/x86_64/mount-cifs-3.0.37-0.1mdv2008.1.x86_64.rpm\n 1c5d88beecca4b39e814c865f67d67f1 2008.1/x86_64/nss_wins-3.0.37-0.1mdv2008.1.x86_64.rpm\n c4c16d39b64ab8a63f9a04af29984cf3 2008.1/x86_64/samba-client-3.0.37-0.1mdv2008.1.x86_64.rpm\n 1afe4d19ed5ad2409c03399dd23bde51 2008.1/x86_64/samba-common-3.0.37-0.1mdv2008.1.x86_64.rpm\n 9913781e24af986bbdace14171361726 2008.1/x86_64/samba-doc-3.0.37-0.1mdv2008.1.x86_64.rpm\n ebe658ed48038b5cce733c78775e2948 2008.1/x86_64/samba-server-3.0.37-0.1mdv2008.1.x86_64.rpm\n 9db457d2ec2e6694eedc71e65686e075 2008.1/x86_64/samba-swat-3.0.37-0.1mdv2008.1.x86_64.rpm\n c53a88fc82dd5a7ddc4c33c606a50ce6 2008.1/x86_64/samba-vscan-icap-3.0.37-0.1mdv2008.1.x86_64.rpm\n f6419abf5f60d68a7f5255a24493ca94 2008.1/x86_64/samba-winbind-3.0.37-0.1mdv2008.1.x86_64.rpm \n 814b5cbb37717cfb25d86de35231c436 2008.1/SRPMS/samba-3.0.37-0.1mdv2008.1.src.rpm\n\n Mandriva Linux 2009.0:\n efb050a33295b9425e3ca8fb9ec05fef 2009.0/i586/libnetapi0-3.2.15-0.1mdv2009.0.i586.rpm\n 846e3afd2bab276430d7cde4fdf03c0e 2009.0/i586/libnetapi-devel-3.2.15-0.1mdv2009.0.i586.rpm\n b852a65671ff7559ead332fd72bb5c94 2009.0/i586/libsmbclient0-3.2.15-0.1mdv2009.0.i586.rpm\n 21c04220c90da910f918e302e52666d9 2009.0/i586/libsmbclient0-devel-3.2.15-0.1mdv2009.0.i586.rpm\n 1e3c49a52489d2acd356cccd04cd56eb 2009.0/i586/libsmbclient0-static-devel-3.2.15-0.1mdv2009.0.i586.rpm\n 922b7d1fc60659c443a22a5cf9141ea4 2009.0/i586/libsmbsharemodes0-3.2.15-0.1mdv2009.0.i586.rpm\n a5f28ffcefbc37adfd5004336a2fe6a0 2009.0/i586/libsmbsharemodes-devel-3.2.15-0.1mdv2009.0.i586.rpm\n 3a2666105db13504afec89f7dd6a67d0 2009.0/i586/libtalloc1-3.2.15-0.1mdv2009.0.i586.rpm\n ab99aadd26276c8bbc96da52fcd3fb46 2009.0/i586/libtalloc-devel-3.2.15-0.1mdv2009.0.i586.rpm\n c2bcd60467dc197621a4a8b578ab8d2f 2009.0/i586/libtdb1-3.2.15-0.1mdv2009.0.i586.rpm\n e47ba9b65282116a881cd8a1d0f5752d 2009.0/i586/libtdb-devel-3.2.15-0.1mdv2009.0.i586.rpm\n 819c8b8e12043dff6f85f266e1092cf9 2009.0/i586/libwbclient0-3.2.15-0.1mdv2009.0.i586.rpm\n e21c0cf32e7b3ac82621c4cf20eb8ffc 2009.0/i586/libwbclient-devel-3.2.15-0.1mdv2009.0.i586.rpm\n ecd74601bbe8661a4424cbf9a24fd9dc 2009.0/i586/mount-cifs-3.2.15-0.1mdv2009.0.i586.rpm\n 656b6e76ea691407eb02eec624d2111e 2009.0/i586/nss_wins-3.2.15-0.1mdv2009.0.i586.rpm\n d80dd9a24fcdaf2a96e481a38e68713b 2009.0/i586/samba-client-3.2.15-0.1mdv2009.0.i586.rpm\n d9065426a3838bd6666db3411392de4a 2009.0/i586/samba-common-3.2.15-0.1mdv2009.0.i586.rpm\n 7513c3208fab5355ad869e2630861d31 2009.0/i586/samba-doc-3.2.15-0.1mdv2009.0.i586.rpm\n e208d566b753481fb9615f5f1f5c37be 2009.0/i586/samba-server-3.2.15-0.1mdv2009.0.i586.rpm\n 31658503f04a3a153b4d65fe62e7f9a5 2009.0/i586/samba-swat-3.2.15-0.1mdv2009.0.i586.rpm\n 764c09b5bbddf403e41024db390ce4f8 2009.0/i586/samba-winbind-3.2.15-0.1mdv2009.0.i586.rpm \n 92f632db2a533f9ffbcbcbe260d2bedc 2009.0/SRPMS/samba-3.2.15-0.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n ff6635036aaeadf00de68e48ad77c7a4 2009.0/x86_64/lib64netapi0-3.2.15-0.1mdv2009.0.x86_64.rpm\n 93dbe82080fcc4f3332b4aa90c2ac9b2 2009.0/x86_64/lib64netapi-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n 39b9c79e40c41d62c7ca7440fa097039 2009.0/x86_64/lib64smbclient0-3.2.15-0.1mdv2009.0.x86_64.rpm\n 4cac1729ea43ca02f485e071c5ff0681 2009.0/x86_64/lib64smbclient0-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n d0e8589df5efbcf9fcc2f6192af3cb6d 2009.0/x86_64/lib64smbclient0-static-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n 9156de31384ce156d30d4e9535634e59 2009.0/x86_64/lib64smbsharemodes0-3.2.15-0.1mdv2009.0.x86_64.rpm\n ce72a170e7af1edc4cdc9121d868999f 2009.0/x86_64/lib64smbsharemodes-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n a97a5555b1e937f706d500386f90a030 2009.0/x86_64/lib64talloc1-3.2.15-0.1mdv2009.0.x86_64.rpm\n 431e616754fff2e16a951ea51939e42b 2009.0/x86_64/lib64talloc-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n 51c7e0bc2006bceb6149804e18db9335 2009.0/x86_64/lib64tdb1-3.2.15-0.1mdv2009.0.x86_64.rpm\n 353b8080b16182401577c206d05cd9fb 2009.0/x86_64/lib64tdb-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n 301ba572774619cf6b6f6d21c1b22dd8 2009.0/x86_64/lib64wbclient0-3.2.15-0.1mdv2009.0.x86_64.rpm\n 3003a8b8a48b25bb13e309ba059f54af 2009.0/x86_64/lib64wbclient-devel-3.2.15-0.1mdv2009.0.x86_64.rpm\n c3c0d95f1da6710dfe86c28b1b977b86 2009.0/x86_64/mount-cifs-3.2.15-0.1mdv2009.0.x86_64.rpm\n 95ffa0c8fc90b800a012cdfe458fd2f1 2009.0/x86_64/nss_wins-3.2.15-0.1mdv2009.0.x86_64.rpm\n fbe98a877504a9512dc40335b52fe8f9 2009.0/x86_64/samba-client-3.2.15-0.1mdv2009.0.x86_64.rpm\n dc8e880521d644a9d1db998c5cb65204 2009.0/x86_64/samba-common-3.2.15-0.1mdv2009.0.x86_64.rpm\n 66bf7a44a5b4d1c4fc66bf2cca34c40c 2009.0/x86_64/samba-doc-3.2.15-0.1mdv2009.0.x86_64.rpm\n e69179920eb13e9c4b6b77c9dd23c09b 2009.0/x86_64/samba-server-3.2.15-0.1mdv2009.0.x86_64.rpm\n f160eb1bb56f3fcf09c3c7d144dadc05 2009.0/x86_64/samba-swat-3.2.15-0.1mdv2009.0.x86_64.rpm\n c25b1e8ebb3ae619e50114d7161221bc 2009.0/x86_64/samba-winbind-3.2.15-0.1mdv2009.0.x86_64.rpm \n 92f632db2a533f9ffbcbcbe260d2bedc 2009.0/SRPMS/samba-3.2.15-0.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.1:\n 16d55726ae18c141c64559bf33155d0e 2009.1/i586/libnetapi0-3.3.8-0.1mdv2009.1.i586.rpm\n 677c6a78ca9087546767cd152f090b96 2009.1/i586/libnetapi-devel-3.3.8-0.1mdv2009.1.i586.rpm\n 59ff6473e2f4d60a96edbf00d120170d 2009.1/i586/libsmbclient0-3.3.8-0.1mdv2009.1.i586.rpm\n 4a9e3207ab02fde3b94c744fbc54761a 2009.1/i586/libsmbclient0-devel-3.3.8-0.1mdv2009.1.i586.rpm\n f8727f9a406380bf3cc63872029dd32d 2009.1/i586/libsmbclient0-static-devel-3.3.8-0.1mdv2009.1.i586.rpm\n a7a70efa02ad348fedeb44a640112e14 2009.1/i586/libsmbsharemodes0-3.3.8-0.1mdv2009.1.i586.rpm\n 44d95965a29b1c6b67e25d804bc12516 2009.1/i586/libsmbsharemodes-devel-3.3.8-0.1mdv2009.1.i586.rpm\n 81878c3eaa03b9a83478189fec6f7055 2009.1/i586/libwbclient0-3.3.8-0.1mdv2009.1.i586.rpm\n ba295f2fb6115acf4018077d7a927437 2009.1/i586/libwbclient-devel-3.3.8-0.1mdv2009.1.i586.rpm\n 9234fc94eac761caa56944841539a8a5 2009.1/i586/mount-cifs-3.3.8-0.1mdv2009.1.i586.rpm\n 8214ceee6fb0874c5c2e89cc247fbd28 2009.1/i586/nss_wins-3.3.8-0.1mdv2009.1.i586.rpm\n 2c00ad654c8f2b5babd0050486c06182 2009.1/i586/samba-client-3.3.8-0.1mdv2009.1.i586.rpm\n 9cf733e60cc0f87b5d328a57169ff4a0 2009.1/i586/samba-common-3.3.8-0.1mdv2009.1.i586.rpm\n dc3b4a5b52d67377a71b2bb1c332e755 2009.1/i586/samba-doc-3.3.8-0.1mdv2009.1.i586.rpm\n 7481e9496d4187f29b1c8d174f34abbb 2009.1/i586/samba-server-3.3.8-0.1mdv2009.1.i586.rpm\n 235c1eb352b8cdd857b4c30653fa3731 2009.1/i586/samba-swat-3.3.8-0.1mdv2009.1.i586.rpm\n 2e25863f3fea545174b2528273fc39b1 2009.1/i586/samba-winbind-3.3.8-0.1mdv2009.1.i586.rpm \n c07466ff2422da51dc1500758b3bdf2e 2009.1/SRPMS/samba-3.3.8-0.1mdv2009.1.src.rpm\n\n Mandriva Linux 2009.1/X86_64:\n 2585e0e6504670b25acd056e96a1666a 2009.1/x86_64/lib64netapi0-3.3.8-0.1mdv2009.1.x86_64.rpm\n d5667734e27c7c9e1f1ce543d0a69bcf 2009.1/x86_64/lib64netapi-devel-3.3.8-0.1mdv2009.1.x86_64.rpm\n 1cae57e6142b5f9852964f57c2448417 2009.1/x86_64/lib64smbclient0-3.3.8-0.1mdv2009.1.x86_64.rpm\n aec3399d0094ac2d2a8df6c04cc8cd80 2009.1/x86_64/lib64smbclient0-devel-3.3.8-0.1mdv2009.1.x86_64.rpm\n 0101adb5e56ea9239d01a6b95265df8e 2009.1/x86_64/lib64smbclient0-static-devel-3.3.8-0.1mdv2009.1.x86_64.rpm\n 221ab5e516926ef22e29de68a5fbb401 2009.1/x86_64/lib64smbsharemodes0-3.3.8-0.1mdv2009.1.x86_64.rpm\n 5093da6bf343f563cbba01adba788238 2009.1/x86_64/lib64smbsharemodes-devel-3.3.8-0.1mdv2009.1.x86_64.rpm\n 0727b03fc3e8facdf6171bbdbbc0b254 2009.1/x86_64/lib64wbclient0-3.3.8-0.1mdv2009.1.x86_64.rpm\n 3b64cde8fb59b5cc5301653f24b02298 2009.1/x86_64/lib64wbclient-devel-3.3.8-0.1mdv2009.1.x86_64.rpm\n 40b2c4c0458d02e9ec09c1f665650074 2009.1/x86_64/mount-cifs-3.3.8-0.1mdv2009.1.x86_64.rpm\n 0a070ac11d73d7c5005516868c8acb0f 2009.1/x86_64/nss_wins-3.3.8-0.1mdv2009.1.x86_64.rpm\n 8ce7fda815396961bc091a8de6d5aaca 2009.1/x86_64/samba-client-3.3.8-0.1mdv2009.1.x86_64.rpm\n 074e2419563fcc09941edb756786aafd 2009.1/x86_64/samba-common-3.3.8-0.1mdv2009.1.x86_64.rpm\n 35a4b8335e400d6817903a781ce60fae 2009.1/x86_64/samba-doc-3.3.8-0.1mdv2009.1.x86_64.rpm\n 91ed9e1f370de8ccafd97a4b6274af75 2009.1/x86_64/samba-server-3.3.8-0.1mdv2009.1.x86_64.rpm\n 0f3b675161add2e6e39bf7bcd8d0efc4 2009.1/x86_64/samba-swat-3.3.8-0.1mdv2009.1.x86_64.rpm\n 6303fb16df9f940a83574aa02c15ecd8 2009.1/x86_64/samba-winbind-3.3.8-0.1mdv2009.1.x86_64.rpm \n c07466ff2422da51dc1500758b3bdf2e 2009.1/SRPMS/samba-3.3.8-0.1mdv2009.1.src.rpm\n\n Corporate 3.0:\n 24c5b1096fdea3139d16d4920e4f3d5e corporate/3.0/i586/libsmbclient0-3.0.14a-6.11.C30mdk.i586.rpm\n d9367df65666dc8f1cacbab3cd94759a corporate/3.0/i586/libsmbclient0-devel-3.0.14a-6.11.C30mdk.i586.rpm\n fac9eec996c5da54e13cc1a3272008aa corporate/3.0/i586/libsmbclient0-static-devel-3.0.14a-6.11.C30mdk.i586.rpm\n 18c14b2785aaa0fedcf7e75641359162 corporate/3.0/i586/mount-cifs-3.0.14a-6.11.C30mdk.i586.rpm\n ebd4e835fbe370ee891fca93b077e607 corporate/3.0/i586/nss_wins-3.0.14a-6.11.C30mdk.i586.rpm\n 3546cab569f983f83f5897af3660d02f corporate/3.0/i586/samba-client-3.0.14a-6.11.C30mdk.i586.rpm\n 928a14eb92d7298d2a17f0298ffa1724 corporate/3.0/i586/samba-common-3.0.14a-6.11.C30mdk.i586.rpm\n 463337aab33d8c41aacd091c0c3e43fc corporate/3.0/i586/samba-doc-3.0.14a-6.11.C30mdk.i586.rpm\n 8e8349ce95d2bfbd341779369b5025ea corporate/3.0/i586/samba-passdb-xml-3.0.14a-6.11.C30mdk.i586.rpm\n 5ec36e5ef8cb394357fc53c8da336c7e corporate/3.0/i586/samba-server-3.0.14a-6.11.C30mdk.i586.rpm\n 7028fabe6d04ce0fa301c64e4fdd917e corporate/3.0/i586/samba-smbldap-tools-3.0.14a-6.11.C30mdk.i586.rpm\n 1e122a5d446705da97c138a82bc3a172 corporate/3.0/i586/samba-swat-3.0.14a-6.11.C30mdk.i586.rpm\n 459c55822bf11d8c502026b4ab284fb0 corporate/3.0/i586/samba-vscan-antivir-3.0.14a-6.11.C30mdk.i586.rpm\n 7db0ce83564250560ffb82a5ec10621c corporate/3.0/i586/samba-vscan-clamav-3.0.14a-6.11.C30mdk.i586.rpm\n 179ba9e3360c9e75700332aa19994e62 corporate/3.0/i586/samba-vscan-icap-3.0.14a-6.11.C30mdk.i586.rpm\n eb52755bb9a984a2fd93318400a99e3a corporate/3.0/i586/samba-winbind-3.0.14a-6.11.C30mdk.i586.rpm \n e7d6547c08d05538ead2b1f583d72879 corporate/3.0/SRPMS/samba-3.0.14a-6.11.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n 25efb0f8851063dd4f85ce5efe366745 corporate/3.0/x86_64/lib64smbclient0-3.0.14a-6.11.C30mdk.x86_64.rpm\n 7bbcd06e7c3f79219aa1078a0cacbc97 corporate/3.0/x86_64/lib64smbclient0-devel-3.0.14a-6.11.C30mdk.x86_64.rpm\n f7be50563342779491e1338d8f4386db corporate/3.0/x86_64/lib64smbclient0-static-devel-3.0.14a-6.11.C30mdk.x86_64.rpm\n 838ef7ea583cb95cc863c8cf1425a3c1 corporate/3.0/x86_64/mount-cifs-3.0.14a-6.11.C30mdk.x86_64.rpm\n d30ce3c9fc8dc04a44856b8de5475d2a corporate/3.0/x86_64/nss_wins-3.0.14a-6.11.C30mdk.x86_64.rpm\n e678babbca3ead8a8776c21e836bd1f6 corporate/3.0/x86_64/samba-client-3.0.14a-6.11.C30mdk.x86_64.rpm\n 53de1c937fe96963251d43aa7135c936 corporate/3.0/x86_64/samba-common-3.0.14a-6.11.C30mdk.x86_64.rpm\n b378c72cd5da2e8744fc18f948ba2296 corporate/3.0/x86_64/samba-doc-3.0.14a-6.11.C30mdk.x86_64.rpm\n bb8bf3b0569c252d9d0d9192ae879b6d corporate/3.0/x86_64/samba-passdb-xml-3.0.14a-6.11.C30mdk.x86_64.rpm\n 35139f2f5c4a6e244570913e5069efe2 corporate/3.0/x86_64/samba-server-3.0.14a-6.11.C30mdk.x86_64.rpm\n 4171ce3978bbfd54a3f8ea2215cd997c corporate/3.0/x86_64/samba-smbldap-tools-3.0.14a-6.11.C30mdk.x86_64.rpm\n 5187188c8a9e7de056274a32b87c80da corporate/3.0/x86_64/samba-swat-3.0.14a-6.11.C30mdk.x86_64.rpm\n 8ede5f2d1cd5a62cdabeaf50846b917a corporate/3.0/x86_64/samba-vscan-antivir-3.0.14a-6.11.C30mdk.x86_64.rpm\n ba36875f98009a110ed3a866a163baf9 corporate/3.0/x86_64/samba-vscan-clamav-3.0.14a-6.11.C30mdk.x86_64.rpm\n 57c81613fafbc73fdfda56b42ce8e89d corporate/3.0/x86_64/samba-vscan-icap-3.0.14a-6.11.C30mdk.x86_64.rpm\n cc92aea8b3de4bd7031ad16cff1dd130 corporate/3.0/x86_64/samba-winbind-3.0.14a-6.11.C30mdk.x86_64.rpm \n e7d6547c08d05538ead2b1f583d72879 corporate/3.0/SRPMS/samba-3.0.14a-6.11.C30mdk.src.rpm\n\n Corporate 4.0:\n 047660a6bf073366bd9b354078311ed8 corporate/4.0/i586/libsmbclient0-3.0.37-0.1.20060mlcs4.i586.rpm\n 2add9cc76f133c4a88816242518c632a corporate/4.0/i586/libsmbclient0-devel-3.0.37-0.1.20060mlcs4.i586.rpm\n 8e724f03722eaf5bd8a7f8f483175e1c corporate/4.0/i586/libsmbclient0-static-devel-3.0.37-0.1.20060mlcs4.i586.rpm\n 9c416f3cf56fad431d0ac51746841ce3 corporate/4.0/i586/mount-cifs-3.0.37-0.1.20060mlcs4.i586.rpm\n 41e03757979dbc08a735cc07eb70a59b corporate/4.0/i586/nss_wins-3.0.37-0.1.20060mlcs4.i586.rpm\n ea3291cde574a02eb3b6d9af74ffb2a8 corporate/4.0/i586/samba-client-3.0.37-0.1.20060mlcs4.i586.rpm\n af7624926aa5e3b6168208047d6c4c46 corporate/4.0/i586/samba-common-3.0.37-0.1.20060mlcs4.i586.rpm\n 8d77caca4375145ee8d3aa942622e428 corporate/4.0/i586/samba-doc-3.0.37-0.1.20060mlcs4.i586.rpm\n a40cc758d1ff0bfa623b06b601132a4f corporate/4.0/i586/samba-server-3.0.37-0.1.20060mlcs4.i586.rpm\n 860e1a63926f2882b2c95b61f87b6e42 corporate/4.0/i586/samba-swat-3.0.37-0.1.20060mlcs4.i586.rpm\n 668845748f59d8ab267077b409cf7d10 corporate/4.0/i586/samba-vscan-icap-3.0.37-0.1.20060mlcs4.i586.rpm\n 34826f546a50388da7532f64d7280894 corporate/4.0/i586/samba-winbind-3.0.37-0.1.20060mlcs4.i586.rpm \n a47770cd28d9d2f1204bb192df70375c corporate/4.0/SRPMS/samba-3.0.37-0.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 77f62b3eb1efd66a7ea3ba8d84a8d43c corporate/4.0/x86_64/lib64smbclient0-3.0.37-0.1.20060mlcs4.x86_64.rpm\n b7eea9e6f961648d40c0b0d6eda33019 corporate/4.0/x86_64/lib64smbclient0-devel-3.0.37-0.1.20060mlcs4.x86_64.rpm\n 2f8bcc3b5c02626a86d2c2d2f54b278a corporate/4.0/x86_64/lib64smbclient0-static-devel-3.0.37-0.1.20060mlcs4.x86_64.rpm\n a20859389b661bc5865d95025237e668 corporate/4.0/x86_64/mount-cifs-3.0.37-0.1.20060mlcs4.x86_64.rpm\n 5cad07ac4c044c60b185db3de3882b27 corporate/4.0/x86_64/nss_wins-3.0.37-0.1.20060mlcs4.x86_64.rpm\n 82e1f61d0efdb2d2933e34947674bd9e corporate/4.0/x86_64/samba-client-3.0.37-0.1.20060mlcs4.x86_64.rpm\n 4fc7c9673ababbbb18eb479145796894 corporate/4.0/x86_64/samba-common-3.0.37-0.1.20060mlcs4.x86_64.rpm\n e30ca5d0cc234b98d0dc8627a1bc1d05 corporate/4.0/x86_64/samba-doc-3.0.37-0.1.20060mlcs4.x86_64.rpm\n bf01a661b1f653e1aa8e59cdb667bbbe corporate/4.0/x86_64/samba-server-3.0.37-0.1.20060mlcs4.x86_64.rpm\n fcc1b0212eec0186a8c9a0ad41af6ad7 corporate/4.0/x86_64/samba-swat-3.0.37-0.1.20060mlcs4.x86_64.rpm\n da660519148e16f2c0cb9d21db2cb67a corporate/4.0/x86_64/samba-vscan-icap-3.0.37-0.1.20060mlcs4.x86_64.rpm\n 8bd44cc57cb93d30550f04094e25191c corporate/4.0/x86_64/samba-winbind-3.0.37-0.1.20060mlcs4.x86_64.rpm \n a47770cd28d9d2f1204bb192df70375c corporate/4.0/SRPMS/samba-3.0.37-0.1.20060mlcs4.src.rpm\n\n Mandriva Enterprise Server 5:\n ee5e0ba339dae934a1cb81040603d0eb mes5/i586/libnetapi0-3.2.15-0.1mdvmes5.i586.rpm\n a2138a459fe213114948ecaa3c38eb0a mes5/i586/libnetapi-devel-3.2.15-0.1mdvmes5.i586.rpm\n 35900db03c61dc537536c469faca8892 mes5/i586/libsmbclient0-3.2.15-0.1mdvmes5.i586.rpm\n fd96f9d9da799991c497c5bcbdb8eb99 mes5/i586/libsmbclient0-devel-3.2.15-0.1mdvmes5.i586.rpm\n 80b763083318d3691be23ebbc40d1985 mes5/i586/libsmbclient0-static-devel-3.2.15-0.1mdvmes5.i586.rpm\n 4ae18fa289d37dea0d2bc5dfdb2317b9 mes5/i586/libsmbsharemodes0-3.2.15-0.1mdvmes5.i586.rpm\n ef80a8b52ce4b6d5330c58b3586e4481 mes5/i586/libsmbsharemodes-devel-3.2.15-0.1mdvmes5.i586.rpm\n d7fdd39eeaab7a8e3e5a062661817e67 mes5/i586/libtalloc1-3.2.15-0.1mdvmes5.i586.rpm\n 5e60b3bd0a75e0d54138802918fe729e mes5/i586/libtalloc-devel-3.2.15-0.1mdvmes5.i586.rpm\n c665f78c314702a64f08ae8f54552b9a mes5/i586/libtdb1-3.2.15-0.1mdvmes5.i586.rpm\n 706e6b795143f8c66a94525251354f4e mes5/i586/libtdb-devel-3.2.15-0.1mdvmes5.i586.rpm\n 3cc7fb704a4c2629ab22211c506b4e84 mes5/i586/libwbclient0-3.2.15-0.1mdvmes5.i586.rpm\n 5fb302fe81d2545189bb9d09c43a5121 mes5/i586/libwbclient-devel-3.2.15-0.1mdvmes5.i586.rpm\n ed17b8a6a8a5fe2e346a694a8f2d7d09 mes5/i586/mount-cifs-3.2.15-0.1mdvmes5.i586.rpm\n 7bf8865e9f5c2ca25727e223dff8255a mes5/i586/nss_wins-3.2.15-0.1mdvmes5.i586.rpm\n 8ee63ef26bf846b4678c2cb1014b8d74 mes5/i586/samba-client-3.2.15-0.1mdvmes5.i586.rpm\n f070d6b6c9575e19143e6821c6e001ff mes5/i586/samba-common-3.2.15-0.1mdvmes5.i586.rpm\n c320a8446ebc80e48f8f2a4b633a484b mes5/i586/samba-doc-3.2.15-0.1mdvmes5.i586.rpm\n 8e1bfda1593920a80c0eae11ccb3dbd1 mes5/i586/samba-server-3.2.15-0.1mdvmes5.i586.rpm\n 01fb4c1c14c04e4752725de9a0bc0eac mes5/i586/samba-swat-3.2.15-0.1mdvmes5.i586.rpm\n 65ce6c6c1dfa009bcc43315a5ec4ccf3 mes5/i586/samba-winbind-3.2.15-0.1mdvmes5.i586.rpm \n 03855a2e42003a125af121eb9738ebd5 mes5/SRPMS/samba-3.2.15-0.1mdvmes5.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n ad357d021aaea783c3a9582e36e5e6bd mes5/x86_64/lib64netapi0-3.2.15-0.1mdvmes5.x86_64.rpm\n 6913e5c18f96b3f54bbe9b93e6edb8d6 mes5/x86_64/lib64netapi-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n 86fc5c1e35809123367b7ae28ba03eb9 mes5/x86_64/lib64smbclient0-3.2.15-0.1mdvmes5.x86_64.rpm\n 0b4c0a7481de6b52ea593a9f5e9b584b mes5/x86_64/lib64smbclient0-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n 007c85e7b30e817ea0ff3298318ba10b mes5/x86_64/lib64smbclient0-static-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n 66034bc8194eb1dd4543e719c175f09a mes5/x86_64/lib64smbsharemodes0-3.2.15-0.1mdvmes5.x86_64.rpm\n 7f6fee0d5d832dd4034bb4b75ac37067 mes5/x86_64/lib64smbsharemodes-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n eca90c14a1d4bde2f644c2d1fd6ef3c6 mes5/x86_64/lib64talloc1-3.2.15-0.1mdvmes5.x86_64.rpm\n 9976c09999010e7941bbe0dc1fe6ca5f mes5/x86_64/lib64talloc-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n aab081f61e82ddf3f632790f27cb5ce7 mes5/x86_64/lib64tdb1-3.2.15-0.1mdvmes5.x86_64.rpm\n 7e09992d972229bb7a6ebd82652c8901 mes5/x86_64/lib64tdb-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n 4eac64f49ac6a1de779880dd5cb35ac2 mes5/x86_64/lib64wbclient0-3.2.15-0.1mdvmes5.x86_64.rpm\n 97bc3355ba4fb14cf7fdcf3de573a756 mes5/x86_64/lib64wbclient-devel-3.2.15-0.1mdvmes5.x86_64.rpm\n 58e2bad7d693718fa7b2325c9a3ffe7d mes5/x86_64/mount-cifs-3.2.15-0.1mdvmes5.x86_64.rpm\n 5f5705776b2d82f177e9bacc65871f54 mes5/x86_64/nss_wins-3.2.15-0.1mdvmes5.x86_64.rpm\n 77fceb32cdfe7d51c18af0cff52e04c6 mes5/x86_64/samba-client-3.2.15-0.1mdvmes5.x86_64.rpm\n c2bb12c0752dbed3294b4c0c5916e8c0 mes5/x86_64/samba-common-3.2.15-0.1mdvmes5.x86_64.rpm\n 53356120576a52daa576305583312f42 mes5/x86_64/samba-doc-3.2.15-0.1mdvmes5.x86_64.rpm\n 8c3ea40fa44b17279b3ac6143696833d mes5/x86_64/samba-server-3.2.15-0.1mdvmes5.x86_64.rpm\n 642a8cb6ec8f6c8324b16afe7e65359b mes5/x86_64/samba-swat-3.2.15-0.1mdvmes5.x86_64.rpm\n b75993170697d32dec52afecc79c991f mes5/x86_64/samba-winbind-3.2.15-0.1mdvmes5.x86_64.rpm \n 03855a2e42003a125af121eb9738ebd5 mes5/SRPMS/samba-3.2.15-0.1mdvmes5.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFK1bXKmqjQ0CJFipgRAnbTAKDYpf2++bD/H+jbl61t8P9IXw2GuACguZoT\nzmZwuB3govO6Ux2stXPDUps=\n=KymD\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2009-2813" }, { "db": "BID", "id": "36363" }, { "db": "VULHUB", "id": "VHN-40259" }, { "db": "PACKETSTORM", "id": "83515" }, { "db": "PACKETSTORM", "id": "81971" }, { "db": "PACKETSTORM", "id": "87971" }, { "db": "PACKETSTORM", "id": "85887" }, { "db": "PACKETSTORM", "id": "81768" }, { "db": "PACKETSTORM", "id": "81753" }, { "db": "PACKETSTORM", "id": "81968" } ], "trust": 1.89 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-40259", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-40259" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-2813", "trust": 2.7 }, { "db": "SECUNIA", "id": "36893", "trust": 1.9 }, { "db": "SECUNIA", "id": "36953", "trust": 1.7 }, { "db": "SECUNIA", "id": "36918", "trust": 1.7 }, { "db": "SECUNIA", "id": "36937", "trust": 1.7 }, { "db": "SECUNIA", "id": "36701", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2009-2810", "trust": 1.7 }, { "db": "BID", "id": "36363", "trust": 1.4 }, { "db": "SECUNIA", "id": "37428", "trust": 1.1 }, { "db": "OSVDB", "id": "57955", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-200909-281", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20091112 RPSA-2009-0145-1 SAMBA SAMBA-CLIENT SAMBA-SERVER SAMBA-SWAT", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-839-1", "trust": 0.6 }, { "db": "SLACKWARE", "id": "SSA:2009-276-01", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2009-10180", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2009-10172", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2009-09-10-2", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85887", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "81968", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-40259", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "83515", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81971", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "87971", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81753", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-40259" }, { "db": "BID", "id": "36363" }, { "db": "PACKETSTORM", "id": "83515" }, { "db": "PACKETSTORM", "id": "81971" }, { "db": "PACKETSTORM", "id": "87971" }, { "db": "PACKETSTORM", "id": "85887" }, { "db": "PACKETSTORM", "id": "81768" }, { "db": "PACKETSTORM", "id": "81753" }, { "db": "PACKETSTORM", "id": "81968" }, { "db": "CNNVD", "id": "CNNVD-200909-281" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "id": "VAR-200909-0782", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-40259" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:53:20.038000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-40259" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.samba.org/samba/security/cve-2009-2813.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/sep/msg00004.html" }, { "trust": 1.7, "url": "http://news.samba.org/releases/3.0.37/" }, { "trust": 1.7, "url": "http://news.samba.org/releases/3.2.15/" }, { "trust": 1.7, "url": "http://news.samba.org/releases/3.3.8/" }, { "trust": 1.7, "url": "http://news.samba.org/releases/3.4.2/" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3865" }, { "trust": 1.7, "url": "http://wiki.rpath.com/advisories:rpsa-2009-0145" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-october/msg00098.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-october/msg00095.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36701" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36893" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36918" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36937" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36953" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-839-1" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/2810" }, { "trust": 1.6, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/36363" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded" }, { "trust": 1.1, "url": "http://osvdb.org/57955" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7211" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7257" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7791" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9191" }, { "trust": 1.1, "url": "http://secunia.com/advisories/37428" }, { "trust": 1.1, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2813" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/507856/100/0/threaded" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2948" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2906" }, { "trust": 0.3, "url": "http://us1.samba.org/samba/" }, { "trust": 0.3, "url": "/archive/1/510494" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-271069-1" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100069850" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100070075" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2906" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2813" }, { "trust": 0.3, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2948" }, { "trust": 0.3, "url": "http://www.samba.org/samba/security/cve-2009-2906.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1888" }, { "trust": 0.3, "url": "http://www.samba.org/samba/security/cve-2009-2948.html" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1888" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=126514298313071\u0026amp;w=2" }, { "trust": 0.1, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2009\u0026amp;m=slackware-security.561439" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-doc_3.2.5-4lenny7_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mips.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-doc-pdf_3.2.5-4lenny7_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny7_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny7_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny7_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny7_amd64.deb" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/lifecycle/vi/faq.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0798" }, { "trust": 0.1, "url": "https://hostupdate.vmware.com/software/vum/offline/release-195-20100324-069" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1019833" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0798" }, { "trust": 0.1, "url": "http://www.hp.com/go/softwaredepot/" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.3.2-1ubuntu3.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.22-1ubuntu3.9_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.3.2-1ubuntu3.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1886" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.2.3-1ubuntu3.6_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.2.3-1ubuntu3.6_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbclient_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.22-1ubuntu3.9_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libpam-smbpass_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libpam-smbpass_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/swat_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/winbind_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libwbclient0_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/swat_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/smbfs_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-tools_3.2.3-1ubuntu3.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.2.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2-1ubuntu3.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.22-1ubuntu3.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/samba-tools_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.3.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.0.28a-1ubuntu4.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc-pdf_3.0.28a-1ubuntu4.9_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/python2.4-samba_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/winbind_3.2.3-1ubuntu3.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/s/samba/swat_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbfs_3.0.28a-1ubuntu4.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-dbg_3.2.3-1ubuntu3.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.2.3-1ubuntu3.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba_3.0.22-1ubuntu3.9_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libwbclient0_3.3.2-1ubuntu3.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/libsmbclient-dev_3.3.2-1ubuntu3.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/samba-common_3.3.2-1ubuntu3.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/smbclient_3.0.22-1ubuntu3.9_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient_3.2.3-1ubuntu3.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/s/samba/libsmbclient-dev_3.0.28a-1ubuntu4.9_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/s/samba/samba-doc_3.0.28a-1ubuntu4.9_all.deb" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/36893/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.samba.org/samba/history/security.html" }, { "trust": 0.1, "url": "http://samba.org/samba/download/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-40259" }, { "db": "BID", "id": "36363" }, { "db": "PACKETSTORM", "id": "83515" }, { "db": "PACKETSTORM", "id": "81971" }, { "db": "PACKETSTORM", "id": "87971" }, { "db": "PACKETSTORM", "id": "85887" }, { "db": "PACKETSTORM", "id": "81768" }, { "db": "PACKETSTORM", "id": "81753" }, { "db": "PACKETSTORM", "id": "81968" }, { "db": "CNNVD", "id": "CNNVD-200909-281" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-40259" }, { "db": "BID", "id": "36363" }, { "db": "PACKETSTORM", "id": "83515" }, { "db": "PACKETSTORM", "id": "81971" }, { "db": "PACKETSTORM", "id": "87971" }, { "db": "PACKETSTORM", "id": "85887" }, { "db": "PACKETSTORM", "id": "81768" }, { "db": "PACKETSTORM", "id": "81753" }, { "db": "PACKETSTORM", "id": "81968" }, { "db": "CNNVD", "id": "CNNVD-200909-281" }, { "db": "NVD", "id": "CVE-2009-2813" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-09-14T00:00:00", "db": "VULHUB", "id": "VHN-40259" }, { "date": "2009-09-10T00:00:00", "db": "BID", "id": "36363" }, { "date": "2009-12-07T21:43:42", "db": "PACKETSTORM", "id": "83515" }, { "date": "2009-10-14T18:30:48", "db": "PACKETSTORM", "id": "81971" }, { "date": "2010-04-02T00:49:30", "db": "PACKETSTORM", "id": "87971" }, { "date": "2010-02-03T04:09:17", "db": "PACKETSTORM", "id": "85887" }, { "date": "2009-10-02T01:39:49", "db": "PACKETSTORM", "id": "81768" }, { "date": "2009-10-01T13:53:32", "db": "PACKETSTORM", "id": "81753" }, { "date": "2009-10-14T18:28:45", "db": "PACKETSTORM", "id": "81968" }, { "date": "2009-09-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-281" }, { "date": "2009-09-14T16:30:00.453000", "db": "NVD", "id": "CVE-2009-2813" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULHUB", "id": "VHN-40259" }, { "date": "2015-04-13T21:14:00", "db": "BID", "id": "36363" }, { "date": "2009-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-281" }, { "date": "2018-10-10T19:42:12.513000", "db": "NVD", "id": "CVE-2009-2813" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "85887" }, { "db": "CNNVD", "id": "CNNVD-200909-281" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X Samba Local File System Permission Control Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-281" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-281" } ], "trust": 0.6 } }
var-201202-0323
Vulnerability from variot
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion. It highlights game, media publishing and collaboration features. The BlackBerry PlayBook Tablet is a tablet from BlackBerry. The Samba service is used for file sharing between the platform computer and the computer, and remote attackers can exploit the vulnerability to gain control over the Wi-Fi file sharing system through the Wi-Fi network. This vulnerability is also affected when the tablet is connected to the computer using USB and if the attacker can physically access the computer. Samba is prone to a heap-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. Samba versions prior to 3.4.0 are affected. ----------------------------------------------------------------------
Secunia presentations @ RSA Conference 2012, San Francisco, USA, 27 Feb-02 March Listen to our Chief Security Specialist, Research Analyst Director, and Director Product Management & Quality Assurance discuss the industry's key topics. Also, visit the Secunia stand #817. Find out more: http://www.rsaconference.com/events/2012/usa/index.htm
TITLE: Samba Any Batched Request Handling Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA48152
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48152/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48152
RELEASE DATE: 2012-02-24
DISCUSS ADVISORY: http://secunia.com/advisories/48152/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48152/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48152
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Samba, which can be exploited by malicious people to compromise a vulnerable system.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: Originally reported in BlackBerry Tablet OS by Andy Davis, NGS Secure.
ORIGINAL ADVISORY: http://www.samba.org/samba/security/CVE-2012-0870
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870
Updated Packages:
Mandriva Enterprise Server 5: f1c5c40a39960bf0be8b4f7b0eb07f1c mes5/i586/libnetapi0-3.3.12-0.8mdvmes5.2.i586.rpm c09851ea48666122ce67fb3bb5d863b7 mes5/i586/libnetapi-devel-3.3.12-0.8mdvmes5.2.i586.rpm 574874125ee63e520110e73158fa1c53 mes5/i586/libsmbclient0-3.3.12-0.8mdvmes5.2.i586.rpm ed39a5badbcb3dff984d099d995e4654 mes5/i586/libsmbclient0-devel-3.3.12-0.8mdvmes5.2.i586.rpm 37f6c8edc6af9e4439fe1cfa74162fd4 mes5/i586/libsmbclient0-static-devel-3.3.12-0.8mdvmes5.2.i586.rpm e06527be75deb64802f8bfa4c266f9bc mes5/i586/libsmbsharemodes0-3.3.12-0.8mdvmes5.2.i586.rpm 9926b5aa94649fe5e4563d7d30eea094 mes5/i586/libsmbsharemodes-devel-3.3.12-0.8mdvmes5.2.i586.rpm 13ed1d18924705829149f27c89cff483 mes5/i586/libtalloc1-3.3.12-0.8mdvmes5.2.i586.rpm 0dcc0cadaff5d3e9e9b26a4aa76320b9 mes5/i586/libtalloc-devel-3.3.12-0.8mdvmes5.2.i586.rpm f66dc353d8f7cc28d9e9922bc731bd06 mes5/i586/libtdb1-3.3.12-0.8mdvmes5.2.i586.rpm 87689dca4f04ccc56c8b7e2958f870a5 mes5/i586/libtdb-devel-3.3.12-0.8mdvmes5.2.i586.rpm eac4493389bdd505786b2a813800ec21 mes5/i586/libwbclient0-3.3.12-0.8mdvmes5.2.i586.rpm 0a4d9665399a405ec33352bac8b085d7 mes5/i586/libwbclient-devel-3.3.12-0.8mdvmes5.2.i586.rpm 31d01f8f5ac236bdeb5da6c0b1103c26 mes5/i586/mount-cifs-3.3.12-0.8mdvmes5.2.i586.rpm 4d65a41c7adf287f33146cb51976c12f mes5/i586/nss_wins-3.3.12-0.8mdvmes5.2.i586.rpm 95851e4895bebace6a800c21411c2c98 mes5/i586/samba-client-3.3.12-0.8mdvmes5.2.i586.rpm 615ae2342634aa724e233fe7c38e1021 mes5/i586/samba-common-3.3.12-0.8mdvmes5.2.i586.rpm 593f4559e2e7927c3d2be07c75f69fc2 mes5/i586/samba-doc-3.3.12-0.8mdvmes5.2.i586.rpm 082b8b10f48f87102f5f4e5734192274 mes5/i586/samba-server-3.3.12-0.8mdvmes5.2.i586.rpm 671a8293f5c9970eff7f41a382ce1de8 mes5/i586/samba-swat-3.3.12-0.8mdvmes5.2.i586.rpm d0826b2d50dd03a8a2def0ab8217a10b mes5/i586/samba-winbind-3.3.12-0.8mdvmes5.2.i586.rpm e63162eb725a3c786a9d6ce6e3ffa834 mes5/SRPMS/samba-3.3.12-0.8mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: 08052ae7f504d3afebc2592c4563cb26 mes5/x86_64/lib64netapi0-3.3.12-0.8mdvmes5.2.x86_64.rpm 959b440b7a52de85774c7826c23e5a0d mes5/x86_64/lib64netapi-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 4fbf3c6550bbd781101b19a5f59db31f mes5/x86_64/lib64smbclient0-3.3.12-0.8mdvmes5.2.x86_64.rpm fa0e52cf4f492cb5d991ca5305f4eca7 mes5/x86_64/lib64smbclient0-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 3aab55b5470b2dd3fe21bc22aac57881 mes5/x86_64/lib64smbclient0-static-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 62faaa06906b9b03f73d130c30841e24 mes5/x86_64/lib64smbsharemodes0-3.3.12-0.8mdvmes5.2.x86_64.rpm 2989b58fbd3b45bc9f59c252c694970f mes5/x86_64/lib64smbsharemodes-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 7b02247f56fbae2c39148fbbdb2a9753 mes5/x86_64/lib64talloc1-3.3.12-0.8mdvmes5.2.x86_64.rpm c06c34fbdf4472157ce75f438c8975fe mes5/x86_64/lib64talloc-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 05412945bb2a1b2be22aab619395366e mes5/x86_64/lib64tdb1-3.3.12-0.8mdvmes5.2.x86_64.rpm a5d3e798398970a92129d182766049ab mes5/x86_64/lib64tdb-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm fa4659a2d3591b354ed48fe4780e318a mes5/x86_64/lib64wbclient0-3.3.12-0.8mdvmes5.2.x86_64.rpm a647ebd6ed3d00f8e0cf32db8deddd89 mes5/x86_64/lib64wbclient-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm 5075846b37b482eee78d1390284d221f mes5/x86_64/mount-cifs-3.3.12-0.8mdvmes5.2.x86_64.rpm 08968a5c3682f2af4dab4433d3c4906c mes5/x86_64/nss_wins-3.3.12-0.8mdvmes5.2.x86_64.rpm 1f391d0c654c0efa93a4a9b90ff8abad mes5/x86_64/samba-client-3.3.12-0.8mdvmes5.2.x86_64.rpm 9d374a84dab147dd3a7e20f38032740f mes5/x86_64/samba-common-3.3.12-0.8mdvmes5.2.x86_64.rpm fbc801397a2f7b94b06397aed9e037a8 mes5/x86_64/samba-doc-3.3.12-0.8mdvmes5.2.x86_64.rpm 39fde58a25e8180b574cf6e5a8f7e432 mes5/x86_64/samba-server-3.3.12-0.8mdvmes5.2.x86_64.rpm d9f108c12ade5b0f8905cb453cdb99dc mes5/x86_64/samba-swat-3.3.12-0.8mdvmes5.2.x86_64.rpm 78f300cd217228b7e44d0845f2b29c53 mes5/x86_64/samba-winbind-3.3.12-0.8mdvmes5.2.x86_64.rpm e63162eb725a3c786a9d6ce6e3ffa834 mes5/SRPMS/samba-3.3.12-0.8mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFPTQdAmqjQ0CJFipgRAjl5AKCHFXTjEFCIjESHT9QE+lzC/znTUQCeKcKO gBbgJhbdLqBQlAb9QBUHTIM= =j351 -----END PGP SIGNATURE----- . High Risk Vulnerability in Samba
25 February 2012
Andy Davis of NGS Secure has discovered a high risk vulnerability in the Samba service
Impact: Remote Code Execution
Versions affected: Samba versions up to 3.4.0
More details about this vulnerability and how to obtain software updates can be found here: http://www.samba.org/samba/security/CVE-2012-0870
NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure.
NGS Secure Research http://www.ngssecure.com . This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. ============================================================================ Ubuntu Security Notice USN-1374-1 February 24, 2012
samba vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 8.04 LTS
Summary:
Samba could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
Andy Davis discovered that Samba incorrectly handled certain AndX offsets.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04 LTS: samba 3.0.28a-1ubuntu4.17
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: samba security update Advisory ID: RHSA-2012:0332-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0332.html Issue date: 2012-02-23 CVE Names: CVE-2012-0870 =====================================================================
- Summary:
Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5, and Red Hat Enterprise Linux 5.3 Long Life, and 5.6 Extended Update Support.
The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
- Description:
Samba is a suite of programs used by machines to share files, printers, and other information.
An input validation flaw was found in the way Samba handled Any Batched (AndX) requests. A remote, unauthenticated attacker could send a specially-crafted SMB packet to the Samba server, possibly resulting in arbitrary code execution with the privileges of the Samba server (root). (CVE-2012-0870)
Red Hat would like to thank the Samba team for reporting this issue. Upstream acknowledges Andy Davis of NGS Secure as the original reporter.
Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
795509 - CVE-2012-0870 samba: Any Batched ("AndX") request processing infinite recursion and heap-based buffer overflow
- Package List:
Red Hat Enterprise Linux AS version 4:
Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm
i386: samba-3.0.33-0.35.el4.i386.rpm samba-client-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-swat-3.0.33-0.35.el4.i386.rpm
ia64: samba-3.0.33-0.35.el4.ia64.rpm samba-client-3.0.33-0.35.el4.ia64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.ia64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.ia64.rpm samba-swat-3.0.33-0.35.el4.ia64.rpm
ppc: samba-3.0.33-0.35.el4.ppc.rpm samba-client-3.0.33-0.35.el4.ppc.rpm samba-common-3.0.33-0.35.el4.ppc.rpm samba-common-3.0.33-0.35.el4.ppc64.rpm samba-debuginfo-3.0.33-0.35.el4.ppc.rpm samba-debuginfo-3.0.33-0.35.el4.ppc64.rpm samba-swat-3.0.33-0.35.el4.ppc.rpm
s390: samba-3.0.33-0.35.el4.s390.rpm samba-client-3.0.33-0.35.el4.s390.rpm samba-common-3.0.33-0.35.el4.s390.rpm samba-debuginfo-3.0.33-0.35.el4.s390.rpm samba-swat-3.0.33-0.35.el4.s390.rpm
s390x: samba-3.0.33-0.35.el4.s390x.rpm samba-client-3.0.33-0.35.el4.s390x.rpm samba-common-3.0.33-0.35.el4.s390.rpm samba-common-3.0.33-0.35.el4.s390x.rpm samba-debuginfo-3.0.33-0.35.el4.s390.rpm samba-debuginfo-3.0.33-0.35.el4.s390x.rpm samba-swat-3.0.33-0.35.el4.s390x.rpm
x86_64: samba-3.0.33-0.35.el4.x86_64.rpm samba-client-3.0.33-0.35.el4.x86_64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.x86_64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.x86_64.rpm samba-swat-3.0.33-0.35.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm
i386: samba-3.0.33-0.35.el4.i386.rpm samba-client-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-swat-3.0.33-0.35.el4.i386.rpm
x86_64: samba-3.0.33-0.35.el4.x86_64.rpm samba-client-3.0.33-0.35.el4.x86_64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.x86_64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.x86_64.rpm samba-swat-3.0.33-0.35.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm
i386: samba-3.0.33-0.35.el4.i386.rpm samba-client-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-swat-3.0.33-0.35.el4.i386.rpm
ia64: samba-3.0.33-0.35.el4.ia64.rpm samba-client-3.0.33-0.35.el4.ia64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.ia64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.ia64.rpm samba-swat-3.0.33-0.35.el4.ia64.rpm
x86_64: samba-3.0.33-0.35.el4.x86_64.rpm samba-client-3.0.33-0.35.el4.x86_64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.x86_64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.x86_64.rpm samba-swat-3.0.33-0.35.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm
i386: samba-3.0.33-0.35.el4.i386.rpm samba-client-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-swat-3.0.33-0.35.el4.i386.rpm
ia64: samba-3.0.33-0.35.el4.ia64.rpm samba-client-3.0.33-0.35.el4.ia64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.ia64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.ia64.rpm samba-swat-3.0.33-0.35.el4.ia64.rpm
x86_64: samba-3.0.33-0.35.el4.x86_64.rpm samba-client-3.0.33-0.35.el4.x86_64.rpm samba-common-3.0.33-0.35.el4.i386.rpm samba-common-3.0.33-0.35.el4.x86_64.rpm samba-debuginfo-3.0.33-0.35.el4.i386.rpm samba-debuginfo-3.0.33-0.35.el4.x86_64.rpm samba-swat-3.0.33-0.35.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm
i386: libsmbclient-3.0.33-3.38.el5_8.i386.rpm samba-3.0.33-3.38.el5_8.i386.rpm samba-client-3.0.33-3.38.el5_8.i386.rpm samba-common-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm samba-swat-3.0.33-3.38.el5_8.i386.rpm
x86_64: libsmbclient-3.0.33-3.38.el5_8.i386.rpm libsmbclient-3.0.33-3.38.el5_8.x86_64.rpm samba-3.0.33-3.38.el5_8.x86_64.rpm samba-client-3.0.33-3.38.el5_8.x86_64.rpm samba-common-3.0.33-3.38.el5_8.i386.rpm samba-common-3.0.33-3.38.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm samba-swat-3.0.33-3.38.el5_8.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm
i386: libsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm
x86_64: libsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.38.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm
Red Hat Enterprise Linux Long Life (v. 5.3 server):
Source: samba-3.0.33-3.7.el5_3.4.src.rpm
i386: samba-3.0.33-3.7.el5_3.4.i386.rpm samba-client-3.0.33-3.7.el5_3.4.i386.rpm samba-common-3.0.33-3.7.el5_3.4.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.4.i386.rpm samba-swat-3.0.33-3.7.el5_3.4.i386.rpm
ia64: samba-3.0.33-3.7.el5_3.4.ia64.rpm samba-client-3.0.33-3.7.el5_3.4.ia64.rpm samba-common-3.0.33-3.7.el5_3.4.ia64.rpm samba-debuginfo-3.0.33-3.7.el5_3.4.ia64.rpm samba-swat-3.0.33-3.7.el5_3.4.ia64.rpm
x86_64: samba-3.0.33-3.7.el5_3.4.x86_64.rpm samba-client-3.0.33-3.7.el5_3.4.x86_64.rpm samba-common-3.0.33-3.7.el5_3.4.i386.rpm samba-common-3.0.33-3.7.el5_3.4.x86_64.rpm samba-debuginfo-3.0.33-3.7.el5_3.4.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.4.x86_64.rpm samba-swat-3.0.33-3.7.el5_3.4.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.6 server):
Source: samba-3.0.33-3.29.el5_6.4.src.rpm
i386: libsmbclient-3.0.33-3.29.el5_6.4.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.i386.rpm samba-3.0.33-3.29.el5_6.4.i386.rpm samba-client-3.0.33-3.29.el5_6.4.i386.rpm samba-common-3.0.33-3.29.el5_6.4.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.i386.rpm samba-swat-3.0.33-3.29.el5_6.4.i386.rpm
ia64: libsmbclient-3.0.33-3.29.el5_6.4.ia64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.ia64.rpm samba-3.0.33-3.29.el5_6.4.ia64.rpm samba-client-3.0.33-3.29.el5_6.4.ia64.rpm samba-common-3.0.33-3.29.el5_6.4.ia64.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.ia64.rpm samba-swat-3.0.33-3.29.el5_6.4.ia64.rpm
ppc: libsmbclient-3.0.33-3.29.el5_6.4.ppc.rpm libsmbclient-3.0.33-3.29.el5_6.4.ppc64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.ppc.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.ppc64.rpm samba-3.0.33-3.29.el5_6.4.ppc.rpm samba-client-3.0.33-3.29.el5_6.4.ppc.rpm samba-common-3.0.33-3.29.el5_6.4.ppc.rpm samba-common-3.0.33-3.29.el5_6.4.ppc64.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.ppc.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.ppc64.rpm samba-swat-3.0.33-3.29.el5_6.4.ppc.rpm
s390x: libsmbclient-3.0.33-3.29.el5_6.4.s390.rpm libsmbclient-3.0.33-3.29.el5_6.4.s390x.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.s390.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.s390x.rpm samba-3.0.33-3.29.el5_6.4.s390x.rpm samba-client-3.0.33-3.29.el5_6.4.s390x.rpm samba-common-3.0.33-3.29.el5_6.4.s390.rpm samba-common-3.0.33-3.29.el5_6.4.s390x.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.s390.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.s390x.rpm samba-swat-3.0.33-3.29.el5_6.4.s390x.rpm
x86_64: libsmbclient-3.0.33-3.29.el5_6.4.i386.rpm libsmbclient-3.0.33-3.29.el5_6.4.x86_64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.4.x86_64.rpm samba-3.0.33-3.29.el5_6.4.x86_64.rpm samba-client-3.0.33-3.29.el5_6.4.x86_64.rpm samba-common-3.0.33-3.29.el5_6.4.i386.rpm samba-common-3.0.33-3.29.el5_6.4.x86_64.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.4.x86_64.rpm samba-swat-3.0.33-3.29.el5_6.4.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm
i386: libsmbclient-3.0.33-3.38.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm samba-3.0.33-3.38.el5_8.i386.rpm samba-client-3.0.33-3.38.el5_8.i386.rpm samba-common-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm samba-swat-3.0.33-3.38.el5_8.i386.rpm
ia64: libsmbclient-3.0.33-3.38.el5_8.ia64.rpm libsmbclient-devel-3.0.33-3.38.el5_8.ia64.rpm samba-3.0.33-3.38.el5_8.ia64.rpm samba-client-3.0.33-3.38.el5_8.ia64.rpm samba-common-3.0.33-3.38.el5_8.ia64.rpm samba-debuginfo-3.0.33-3.38.el5_8.ia64.rpm samba-swat-3.0.33-3.38.el5_8.ia64.rpm
ppc: libsmbclient-3.0.33-3.38.el5_8.ppc.rpm libsmbclient-3.0.33-3.38.el5_8.ppc64.rpm libsmbclient-devel-3.0.33-3.38.el5_8.ppc.rpm libsmbclient-devel-3.0.33-3.38.el5_8.ppc64.rpm samba-3.0.33-3.38.el5_8.ppc.rpm samba-client-3.0.33-3.38.el5_8.ppc.rpm samba-common-3.0.33-3.38.el5_8.ppc.rpm samba-common-3.0.33-3.38.el5_8.ppc64.rpm samba-debuginfo-3.0.33-3.38.el5_8.ppc.rpm samba-debuginfo-3.0.33-3.38.el5_8.ppc64.rpm samba-swat-3.0.33-3.38.el5_8.ppc.rpm
s390x: libsmbclient-3.0.33-3.38.el5_8.s390.rpm libsmbclient-3.0.33-3.38.el5_8.s390x.rpm libsmbclient-devel-3.0.33-3.38.el5_8.s390.rpm libsmbclient-devel-3.0.33-3.38.el5_8.s390x.rpm samba-3.0.33-3.38.el5_8.s390x.rpm samba-client-3.0.33-3.38.el5_8.s390x.rpm samba-common-3.0.33-3.38.el5_8.s390.rpm samba-common-3.0.33-3.38.el5_8.s390x.rpm samba-debuginfo-3.0.33-3.38.el5_8.s390.rpm samba-debuginfo-3.0.33-3.38.el5_8.s390x.rpm samba-swat-3.0.33-3.38.el5_8.s390x.rpm
x86_64: libsmbclient-3.0.33-3.38.el5_8.i386.rpm libsmbclient-3.0.33-3.38.el5_8.x86_64.rpm libsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.38.el5_8.x86_64.rpm samba-3.0.33-3.38.el5_8.x86_64.rpm samba-client-3.0.33-3.38.el5_8.x86_64.rpm samba-common-3.0.33-3.38.el5_8.i386.rpm samba-common-3.0.33-3.38.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.38.el5_8.i386.rpm samba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm samba-swat-3.0.33-3.38.el5_8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-0870.html https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPRq5BXlSAg2UNWIIRAi8UAKCeG0OK/toZruQMW71pNgX/9EFWJACfWhgR 2fYxfIbc/dSB94Bi22p/vW4= =Pybf -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201206-22
http://security.gentoo.org/
Severity: High Title: Samba: Multiple vulnerabilities Date: June 24, 2012 Bugs: #290633, #310105, #323785, #332063, #337295, #356917, #382263, #386375, #405551, #411487, #414319 ID: 201206-22
Synopsis
Multiple vulnerabilities have been found in Samba, the worst of which may allow execution of arbitrary code with root privileges.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-fs/samba < 3.5.15 >= 3.5.15
Description
Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details. Furthermore, a local attacker may be able to cause a Denial of Service condition or obtain sensitive information in a Samba credentials file.
Workaround
There is no known workaround at this time.
Resolution
All Samba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-3.5.15"
References
[ 1 ] CVE-2009-2906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906 [ 2 ] CVE-2009-2948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948 [ 3 ] CVE-2010-0728 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728 [ 4 ] CVE-2010-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635 [ 5 ] CVE-2010-1642 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642 [ 6 ] CVE-2010-2063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063 [ 7 ] CVE-2010-3069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069 [ 8 ] CVE-2011-0719 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719 [ 9 ] CVE-2011-1678 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678 [ 10 ] CVE-2011-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724 [ 11 ] CVE-2012-0870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870 [ 12 ] CVE-2012-1182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182 [ 13 ] CVE-2012-2111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201206-22.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201202-0323", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.7.3312" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.3" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.6" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.8.4985" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.7" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.8.6067" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.7.2942" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 1.6, "vendor": "rim", "version": "1.0.5" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "3.0.0" }, { "model": "blackberry playbook os", "scope": "lte", "trust": 1.0, "vendor": "rim", "version": "2.0" }, { "model": "blackberry playbook tablet", "scope": "eq", "trust": 1.0, "vendor": "rim", "version": null }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.5.2304" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.5.2342" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.6" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.7.2942" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.7.3312" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.8.6067" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.9, "vendor": "research", "version": "1.0.8.4985" }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "3.0" }, { "model": "playbook", "scope": "lt", "trust": 0.6, "vendor": "blackberry", "version": "2.0.0.7971" }, { "model": "c", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "a", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "b", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "blackberry playbook os", "scope": "eq", "trust": 0.6, "vendor": "rim", "version": "2.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.28" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.13" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.8" }, { "model": "hat enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.5" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "3.0.23a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.12" }, { "model": "hat enterprise linux 5.6.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "hat enterprise linux 5.3.ll", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "hat enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.6" }, { "model": "3.0.27a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "hat enterprise linux 5.4.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.1" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.040" }, { "model": "pre1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.26" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.14" }, { "model": "enterprise linux es 4.5.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.10" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.2" }, { "model": "3.0.20b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3" }, { "model": "enterprise linux es 4.7.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "pre2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "3.0.21b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.21c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.35" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "3.0.21a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.19" }, { "model": "rc3", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.5" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.11" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.14" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.12" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2" }, { "model": "c", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.9" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.22" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.12" }, { "model": "3.0.23b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.17" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.29" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.33" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.1" }, { "model": "3.0.20a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.20" }, { "model": "d", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.13" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.16" }, { "model": "c", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.11" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.7" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.32" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.27" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.31" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.28" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.2" }, { "model": "enterprise linux 5.2.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "linux enterprise sdk sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.7" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.20" }, { "model": "enterprise linux es 4.9.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.26" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "in motion blackberry playbook tablet software", "scope": "ne", "trust": 0.3, "vendor": "research", "version": "2.0.0.7971" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0" }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.16" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.13" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "-r1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.4" }, { "model": "3.0.14a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "hat enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.7" }, { "model": "enterprise linux es 4.6.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.37" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.15" }, { "model": "3.0.23d", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.4" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.15" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.24" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12.1" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.14" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.18" }, { "model": "linux enterprise server for vmware sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.36" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.4" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.27" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "3.0.26a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "core", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.14" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.6" }, { "model": "enterprise linux client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.3" }, { "model": "3.0.23c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.30" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "enterprise linux es 4.8.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "hat desktop workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.11" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "enterprise linux 5.3.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.34" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.20" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3.15" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.2" }, { "model": "suse core for", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9x86" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "BID", "id": "52103" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "CNNVD", "id": "CNNVD-201202-439" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.7.2942:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.7.3312:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.8.6067:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:rim:blackberry_playbook_tablet:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.8.4985:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:rim:blackberry_playbook_os:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-0870" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andy Davis of NGS Secure", "sources": [ { "db": "BID", "id": "52103" } ], "trust": 0.3 }, "cve": "CVE-2012-0870", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 5.5, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2012-0870", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2012-9013", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-0870", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2012-9013", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201202-439", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2012-0870", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "CNNVD", "id": "CNNVD-201202-439" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion. It highlights game, media publishing and collaboration features. The BlackBerry PlayBook Tablet is a tablet from BlackBerry. The Samba service is used for file sharing between the platform computer and the computer, and remote attackers can exploit the vulnerability to gain control over the Wi-Fi file sharing system through the Wi-Fi network. This vulnerability is also affected when the tablet is connected to the computer using USB and if the attacker can physically access the computer. Samba is prone to a heap-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nSamba versions prior to 3.4.0 are affected. ----------------------------------------------------------------------\n\nSecunia presentations @ RSA Conference 2012, San Francisco, USA, 27 Feb-02 March\nListen to our Chief Security Specialist, Research Analyst Director, and Director Product Management \u0026 Quality Assurance discuss the industry\u0027s key topics. Also, visit the Secunia stand #817. Find out more: http://www.rsaconference.com/events/2012/usa/index.htm\n\n----------------------------------------------------------------------\n\nTITLE:\nSamba Any Batched Request Handling Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA48152\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48152/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48152\n\nRELEASE DATE:\n2012-02-24\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48152/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48152/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48152\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Samba, which can be exploited by\nmalicious people to compromise a vulnerable system. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in BlackBerry Tablet OS by Andy Davis, NGS\nSecure. \n\nORIGINAL ADVISORY:\nhttp://www.samba.org/samba/security/CVE-2012-0870\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n f1c5c40a39960bf0be8b4f7b0eb07f1c mes5/i586/libnetapi0-3.3.12-0.8mdvmes5.2.i586.rpm\n c09851ea48666122ce67fb3bb5d863b7 mes5/i586/libnetapi-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n 574874125ee63e520110e73158fa1c53 mes5/i586/libsmbclient0-3.3.12-0.8mdvmes5.2.i586.rpm\n ed39a5badbcb3dff984d099d995e4654 mes5/i586/libsmbclient0-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n 37f6c8edc6af9e4439fe1cfa74162fd4 mes5/i586/libsmbclient0-static-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n e06527be75deb64802f8bfa4c266f9bc mes5/i586/libsmbsharemodes0-3.3.12-0.8mdvmes5.2.i586.rpm\n 9926b5aa94649fe5e4563d7d30eea094 mes5/i586/libsmbsharemodes-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n 13ed1d18924705829149f27c89cff483 mes5/i586/libtalloc1-3.3.12-0.8mdvmes5.2.i586.rpm\n 0dcc0cadaff5d3e9e9b26a4aa76320b9 mes5/i586/libtalloc-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n f66dc353d8f7cc28d9e9922bc731bd06 mes5/i586/libtdb1-3.3.12-0.8mdvmes5.2.i586.rpm\n 87689dca4f04ccc56c8b7e2958f870a5 mes5/i586/libtdb-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n eac4493389bdd505786b2a813800ec21 mes5/i586/libwbclient0-3.3.12-0.8mdvmes5.2.i586.rpm\n 0a4d9665399a405ec33352bac8b085d7 mes5/i586/libwbclient-devel-3.3.12-0.8mdvmes5.2.i586.rpm\n 31d01f8f5ac236bdeb5da6c0b1103c26 mes5/i586/mount-cifs-3.3.12-0.8mdvmes5.2.i586.rpm\n 4d65a41c7adf287f33146cb51976c12f mes5/i586/nss_wins-3.3.12-0.8mdvmes5.2.i586.rpm\n 95851e4895bebace6a800c21411c2c98 mes5/i586/samba-client-3.3.12-0.8mdvmes5.2.i586.rpm\n 615ae2342634aa724e233fe7c38e1021 mes5/i586/samba-common-3.3.12-0.8mdvmes5.2.i586.rpm\n 593f4559e2e7927c3d2be07c75f69fc2 mes5/i586/samba-doc-3.3.12-0.8mdvmes5.2.i586.rpm\n 082b8b10f48f87102f5f4e5734192274 mes5/i586/samba-server-3.3.12-0.8mdvmes5.2.i586.rpm\n 671a8293f5c9970eff7f41a382ce1de8 mes5/i586/samba-swat-3.3.12-0.8mdvmes5.2.i586.rpm\n d0826b2d50dd03a8a2def0ab8217a10b mes5/i586/samba-winbind-3.3.12-0.8mdvmes5.2.i586.rpm \n e63162eb725a3c786a9d6ce6e3ffa834 mes5/SRPMS/samba-3.3.12-0.8mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 08052ae7f504d3afebc2592c4563cb26 mes5/x86_64/lib64netapi0-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 959b440b7a52de85774c7826c23e5a0d mes5/x86_64/lib64netapi-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 4fbf3c6550bbd781101b19a5f59db31f mes5/x86_64/lib64smbclient0-3.3.12-0.8mdvmes5.2.x86_64.rpm\n fa0e52cf4f492cb5d991ca5305f4eca7 mes5/x86_64/lib64smbclient0-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 3aab55b5470b2dd3fe21bc22aac57881 mes5/x86_64/lib64smbclient0-static-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 62faaa06906b9b03f73d130c30841e24 mes5/x86_64/lib64smbsharemodes0-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 2989b58fbd3b45bc9f59c252c694970f mes5/x86_64/lib64smbsharemodes-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 7b02247f56fbae2c39148fbbdb2a9753 mes5/x86_64/lib64talloc1-3.3.12-0.8mdvmes5.2.x86_64.rpm\n c06c34fbdf4472157ce75f438c8975fe mes5/x86_64/lib64talloc-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 05412945bb2a1b2be22aab619395366e mes5/x86_64/lib64tdb1-3.3.12-0.8mdvmes5.2.x86_64.rpm\n a5d3e798398970a92129d182766049ab mes5/x86_64/lib64tdb-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n fa4659a2d3591b354ed48fe4780e318a mes5/x86_64/lib64wbclient0-3.3.12-0.8mdvmes5.2.x86_64.rpm\n a647ebd6ed3d00f8e0cf32db8deddd89 mes5/x86_64/lib64wbclient-devel-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 5075846b37b482eee78d1390284d221f mes5/x86_64/mount-cifs-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 08968a5c3682f2af4dab4433d3c4906c mes5/x86_64/nss_wins-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 1f391d0c654c0efa93a4a9b90ff8abad mes5/x86_64/samba-client-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 9d374a84dab147dd3a7e20f38032740f mes5/x86_64/samba-common-3.3.12-0.8mdvmes5.2.x86_64.rpm\n fbc801397a2f7b94b06397aed9e037a8 mes5/x86_64/samba-doc-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 39fde58a25e8180b574cf6e5a8f7e432 mes5/x86_64/samba-server-3.3.12-0.8mdvmes5.2.x86_64.rpm\n d9f108c12ade5b0f8905cb453cdb99dc mes5/x86_64/samba-swat-3.3.12-0.8mdvmes5.2.x86_64.rpm\n 78f300cd217228b7e44d0845f2b29c53 mes5/x86_64/samba-winbind-3.3.12-0.8mdvmes5.2.x86_64.rpm \n e63162eb725a3c786a9d6ce6e3ffa834 mes5/SRPMS/samba-3.3.12-0.8mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFPTQdAmqjQ0CJFipgRAjl5AKCHFXTjEFCIjESHT9QE+lzC/znTUQCeKcKO\ngBbgJhbdLqBQlAb9QBUHTIM=\n=j351\n-----END PGP SIGNATURE-----\n. High Risk Vulnerability in Samba\n\n25 February 2012\n\nAndy Davis of NGS Secure has discovered a high risk vulnerability in the Samba service \n\nImpact: Remote Code Execution\n\nVersions affected: Samba versions up to 3.4.0\n\nMore details about this vulnerability and how to obtain software updates can be found here:\nhttp://www.samba.org/samba/security/CVE-2012-0870\n\nNGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure. \n\nNGS Secure Research\nhttp://www.ngssecure.com\n. This fixes multiple\nvulnerabilities, which can be exploited by malicious people to\nconduct cross-site scripting attacks. ============================================================================\nUbuntu Security Notice USN-1374-1\nFebruary 24, 2012\n\nsamba vulnerability\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 8.04 LTS\n\nSummary:\n\nSamba could be made to crash or run programs if it received specially\ncrafted network traffic. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nAndy Davis discovered that Samba incorrectly handled certain AndX offsets. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 8.04 LTS:\n samba 3.0.28a-1ubuntu4.17\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: samba security update\nAdvisory ID: RHSA-2012:0332-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0332.html\nIssue date: 2012-02-23\nCVE Names: CVE-2012-0870 \n=====================================================================\n\n1. Summary:\n\nUpdated samba packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4 and 5, and Red Hat Enterprise Linux 5.3 Long\nLife, and 5.6 Extended Update Support. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop version 4 - i386, x86_64\nRed Hat Enterprise Linux ES version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux WS version 4 - i386, ia64, x86_64\n\n3. Description:\n\nSamba is a suite of programs used by machines to share files, printers, and\nother information. \n\nAn input validation flaw was found in the way Samba handled Any Batched\n(AndX) requests. A remote, unauthenticated attacker could send a\nspecially-crafted SMB packet to the Samba server, possibly resulting in\narbitrary code execution with the privileges of the Samba server (root). \n(CVE-2012-0870)\n\nRed Hat would like to thank the Samba team for reporting this issue. \nUpstream acknowledges Andy Davis of NGS Secure as the original reporter. \n\nUsers of Samba are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing this\nupdate, the smb service will be restarted automatically. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n795509 - CVE-2012-0870 samba: Any Batched (\"AndX\") request processing infinite recursion and heap-based buffer overflow\n\n6. Package List:\n\nRed Hat Enterprise Linux AS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm\n\ni386:\nsamba-3.0.33-0.35.el4.i386.rpm\nsamba-client-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-swat-3.0.33-0.35.el4.i386.rpm\n\nia64:\nsamba-3.0.33-0.35.el4.ia64.rpm\nsamba-client-3.0.33-0.35.el4.ia64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.ia64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.ia64.rpm\nsamba-swat-3.0.33-0.35.el4.ia64.rpm\n\nppc:\nsamba-3.0.33-0.35.el4.ppc.rpm\nsamba-client-3.0.33-0.35.el4.ppc.rpm\nsamba-common-3.0.33-0.35.el4.ppc.rpm\nsamba-common-3.0.33-0.35.el4.ppc64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.ppc.rpm\nsamba-debuginfo-3.0.33-0.35.el4.ppc64.rpm\nsamba-swat-3.0.33-0.35.el4.ppc.rpm\n\ns390:\nsamba-3.0.33-0.35.el4.s390.rpm\nsamba-client-3.0.33-0.35.el4.s390.rpm\nsamba-common-3.0.33-0.35.el4.s390.rpm\nsamba-debuginfo-3.0.33-0.35.el4.s390.rpm\nsamba-swat-3.0.33-0.35.el4.s390.rpm\n\ns390x:\nsamba-3.0.33-0.35.el4.s390x.rpm\nsamba-client-3.0.33-0.35.el4.s390x.rpm\nsamba-common-3.0.33-0.35.el4.s390.rpm\nsamba-common-3.0.33-0.35.el4.s390x.rpm\nsamba-debuginfo-3.0.33-0.35.el4.s390.rpm\nsamba-debuginfo-3.0.33-0.35.el4.s390x.rpm\nsamba-swat-3.0.33-0.35.el4.s390x.rpm\n\nx86_64:\nsamba-3.0.33-0.35.el4.x86_64.rpm\nsamba-client-3.0.33-0.35.el4.x86_64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.x86_64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.x86_64.rpm\nsamba-swat-3.0.33-0.35.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm\n\ni386:\nsamba-3.0.33-0.35.el4.i386.rpm\nsamba-client-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-swat-3.0.33-0.35.el4.i386.rpm\n\nx86_64:\nsamba-3.0.33-0.35.el4.x86_64.rpm\nsamba-client-3.0.33-0.35.el4.x86_64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.x86_64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.x86_64.rpm\nsamba-swat-3.0.33-0.35.el4.x86_64.rpm\n\nRed Hat Enterprise Linux ES version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm\n\ni386:\nsamba-3.0.33-0.35.el4.i386.rpm\nsamba-client-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-swat-3.0.33-0.35.el4.i386.rpm\n\nia64:\nsamba-3.0.33-0.35.el4.ia64.rpm\nsamba-client-3.0.33-0.35.el4.ia64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.ia64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.ia64.rpm\nsamba-swat-3.0.33-0.35.el4.ia64.rpm\n\nx86_64:\nsamba-3.0.33-0.35.el4.x86_64.rpm\nsamba-client-3.0.33-0.35.el4.x86_64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.x86_64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.x86_64.rpm\nsamba-swat-3.0.33-0.35.el4.x86_64.rpm\n\nRed Hat Enterprise Linux WS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/samba-3.0.33-0.35.el4.src.rpm\n\ni386:\nsamba-3.0.33-0.35.el4.i386.rpm\nsamba-client-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-swat-3.0.33-0.35.el4.i386.rpm\n\nia64:\nsamba-3.0.33-0.35.el4.ia64.rpm\nsamba-client-3.0.33-0.35.el4.ia64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.ia64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.ia64.rpm\nsamba-swat-3.0.33-0.35.el4.ia64.rpm\n\nx86_64:\nsamba-3.0.33-0.35.el4.x86_64.rpm\nsamba-client-3.0.33-0.35.el4.x86_64.rpm\nsamba-common-3.0.33-0.35.el4.i386.rpm\nsamba-common-3.0.33-0.35.el4.x86_64.rpm\nsamba-debuginfo-3.0.33-0.35.el4.i386.rpm\nsamba-debuginfo-3.0.33-0.35.el4.x86_64.rpm\nsamba-swat-3.0.33-0.35.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.38.el5_8.i386.rpm\nsamba-3.0.33-3.38.el5_8.i386.rpm\nsamba-client-3.0.33-3.38.el5_8.i386.rpm\nsamba-common-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\nsamba-swat-3.0.33-3.38.el5_8.i386.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.38.el5_8.i386.rpm\nlibsmbclient-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-client-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-common-3.0.33-3.38.el5_8.i386.rpm\nsamba-common-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-swat-3.0.33-3.38.el5_8.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm\n\ni386:\nlibsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\n\nx86_64:\nlibsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux Long Life (v. 5.3 server):\n\nSource:\nsamba-3.0.33-3.7.el5_3.4.src.rpm\n\ni386:\nsamba-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-client-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-common-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-swat-3.0.33-3.7.el5_3.4.i386.rpm\n\nia64:\nsamba-3.0.33-3.7.el5_3.4.ia64.rpm\nsamba-client-3.0.33-3.7.el5_3.4.ia64.rpm\nsamba-common-3.0.33-3.7.el5_3.4.ia64.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.4.ia64.rpm\nsamba-swat-3.0.33-3.7.el5_3.4.ia64.rpm\n\nx86_64:\nsamba-3.0.33-3.7.el5_3.4.x86_64.rpm\nsamba-client-3.0.33-3.7.el5_3.4.x86_64.rpm\nsamba-common-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-common-3.0.33-3.7.el5_3.4.x86_64.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.4.i386.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.4.x86_64.rpm\nsamba-swat-3.0.33-3.7.el5_3.4.x86_64.rpm\n\nRed Hat Enterprise Linux EUS (v. 5.6 server):\n\nSource:\nsamba-3.0.33-3.29.el5_6.4.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.29.el5_6.4.i386.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-client-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-common-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-swat-3.0.33-3.29.el5_6.4.i386.rpm\n\nia64:\nlibsmbclient-3.0.33-3.29.el5_6.4.ia64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.ia64.rpm\nsamba-3.0.33-3.29.el5_6.4.ia64.rpm\nsamba-client-3.0.33-3.29.el5_6.4.ia64.rpm\nsamba-common-3.0.33-3.29.el5_6.4.ia64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.ia64.rpm\nsamba-swat-3.0.33-3.29.el5_6.4.ia64.rpm\n\nppc:\nlibsmbclient-3.0.33-3.29.el5_6.4.ppc.rpm\nlibsmbclient-3.0.33-3.29.el5_6.4.ppc64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.ppc.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.ppc64.rpm\nsamba-3.0.33-3.29.el5_6.4.ppc.rpm\nsamba-client-3.0.33-3.29.el5_6.4.ppc.rpm\nsamba-common-3.0.33-3.29.el5_6.4.ppc.rpm\nsamba-common-3.0.33-3.29.el5_6.4.ppc64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.ppc.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.ppc64.rpm\nsamba-swat-3.0.33-3.29.el5_6.4.ppc.rpm\n\ns390x:\nlibsmbclient-3.0.33-3.29.el5_6.4.s390.rpm\nlibsmbclient-3.0.33-3.29.el5_6.4.s390x.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.s390.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.s390x.rpm\nsamba-3.0.33-3.29.el5_6.4.s390x.rpm\nsamba-client-3.0.33-3.29.el5_6.4.s390x.rpm\nsamba-common-3.0.33-3.29.el5_6.4.s390.rpm\nsamba-common-3.0.33-3.29.el5_6.4.s390x.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.s390.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.s390x.rpm\nsamba-swat-3.0.33-3.29.el5_6.4.s390x.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.29.el5_6.4.i386.rpm\nlibsmbclient-3.0.33-3.29.el5_6.4.x86_64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.i386.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.4.x86_64.rpm\nsamba-3.0.33-3.29.el5_6.4.x86_64.rpm\nsamba-client-3.0.33-3.29.el5_6.4.x86_64.rpm\nsamba-common-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-common-3.0.33-3.29.el5_6.4.x86_64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.i386.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.4.x86_64.rpm\nsamba-swat-3.0.33-3.29.el5_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/samba-3.0.33-3.38.el5_8.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.38.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm\nsamba-3.0.33-3.38.el5_8.i386.rpm\nsamba-client-3.0.33-3.38.el5_8.i386.rpm\nsamba-common-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\nsamba-swat-3.0.33-3.38.el5_8.i386.rpm\n\nia64:\nlibsmbclient-3.0.33-3.38.el5_8.ia64.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.ia64.rpm\nsamba-3.0.33-3.38.el5_8.ia64.rpm\nsamba-client-3.0.33-3.38.el5_8.ia64.rpm\nsamba-common-3.0.33-3.38.el5_8.ia64.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.ia64.rpm\nsamba-swat-3.0.33-3.38.el5_8.ia64.rpm\n\nppc:\nlibsmbclient-3.0.33-3.38.el5_8.ppc.rpm\nlibsmbclient-3.0.33-3.38.el5_8.ppc64.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.ppc.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.ppc64.rpm\nsamba-3.0.33-3.38.el5_8.ppc.rpm\nsamba-client-3.0.33-3.38.el5_8.ppc.rpm\nsamba-common-3.0.33-3.38.el5_8.ppc.rpm\nsamba-common-3.0.33-3.38.el5_8.ppc64.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.ppc.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.ppc64.rpm\nsamba-swat-3.0.33-3.38.el5_8.ppc.rpm\n\ns390x:\nlibsmbclient-3.0.33-3.38.el5_8.s390.rpm\nlibsmbclient-3.0.33-3.38.el5_8.s390x.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.s390.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.s390x.rpm\nsamba-3.0.33-3.38.el5_8.s390x.rpm\nsamba-client-3.0.33-3.38.el5_8.s390x.rpm\nsamba-common-3.0.33-3.38.el5_8.s390.rpm\nsamba-common-3.0.33-3.38.el5_8.s390x.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.s390.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.s390x.rpm\nsamba-swat-3.0.33-3.38.el5_8.s390x.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.38.el5_8.i386.rpm\nlibsmbclient-3.0.33-3.38.el5_8.x86_64.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-client-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-common-3.0.33-3.38.el5_8.i386.rpm\nsamba-common-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.38.el5_8.x86_64.rpm\nsamba-swat-3.0.33-3.38.el5_8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-0870.html\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFPRq5BXlSAg2UNWIIRAi8UAKCeG0OK/toZruQMW71pNgX/9EFWJACfWhgR\n2fYxfIbc/dSB94Bi22p/vW4=\n=Pybf\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201206-22\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Samba: Multiple vulnerabilities\n Date: June 24, 2012\n Bugs: #290633, #310105, #323785, #332063, #337295, #356917,\n #382263, #386375, #405551, #411487, #414319\n ID: 201206-22\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Samba, the worst of which\nmay allow execution of arbitrary code with root privileges. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-fs/samba \u003c 3.5.15 \u003e= 3.5.15\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. Furthermore, a local attacker\nmay be able to cause a Denial of Service condition or obtain sensitive\ninformation in a Samba credentials file. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-3.5.15\"\n\nReferences\n==========\n\n[ 1 ] CVE-2009-2906\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906\n[ 2 ] CVE-2009-2948\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948\n[ 3 ] CVE-2010-0728\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728\n[ 4 ] CVE-2010-1635\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635\n[ 5 ] CVE-2010-1642\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642\n[ 6 ] CVE-2010-2063\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063\n[ 7 ] CVE-2010-3069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069\n[ 8 ] CVE-2011-0719\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719\n[ 9 ] CVE-2011-1678\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678\n[ 10 ] CVE-2011-2724\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724\n[ 11 ] CVE-2012-0870\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870\n[ 12 ] CVE-2012-1182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182\n[ 13 ] CVE-2012-2111\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201206-22.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0870" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "BID", "id": "52103" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "PACKETSTORM", "id": "110204" }, { "db": "PACKETSTORM", "id": "110292" }, { "db": "PACKETSTORM", "id": "110243" }, { "db": "PACKETSTORM", "id": "110098" }, { "db": "PACKETSTORM", "id": "110182" }, { "db": "PACKETSTORM", "id": "110140" }, { "db": "PACKETSTORM", "id": "114137" } ], "trust": 3.69 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0870", "trust": 4.0 }, { "db": "SECUNIA", "id": "48186", "trust": 1.7 }, { "db": "SECUNIA", "id": "48844", "trust": 1.7 }, { "db": "SECUNIA", "id": "48116", "trust": 1.7 }, { "db": "SECUNIA", "id": "48879", "trust": 1.7 }, { "db": "BID", "id": "52103", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-003692", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-9013", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2012-0808", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201202-439", "trust": 0.6 }, { "db": "SECUNIA", "id": "48152", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2012-0870", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110204", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110292", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110243", "trust": 0.1 }, { "db": "SECUNIA", "id": "48066", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110098", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110182", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110140", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114137", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "BID", "id": "52103" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "PACKETSTORM", "id": "110204" }, { "db": "PACKETSTORM", "id": "110292" }, { "db": "PACKETSTORM", "id": "110243" }, { "db": "PACKETSTORM", "id": "110098" }, { "db": "PACKETSTORM", "id": "110182" }, { "db": "PACKETSTORM", "id": "110140" }, { "db": "PACKETSTORM", "id": "114137" }, { "db": "CNNVD", "id": "CNNVD-201202-439" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "id": "VAR-201202-0323", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" } ], "trust": 1.60370372 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" } ] }, "last_update_date": "2024-07-23T19:54:14.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2012-05-09-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "title": "HT5281", "trust": 0.8, "url": "http://support.apple.com/kb/ht5281" }, { "title": "HT5281", "trust": 0.8, "url": "http://support.apple.com/kb/ht5281?viewlocale=ja_jp" }, { "title": "Bug 795509", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509" }, { "title": "CVE-2012-0870", "trust": 0.8, "url": "http://www.samba.org/samba/security/cve-2012-0870.html" }, { "title": "KB29565", "trust": 0.8, "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displaykc\u0026doctype=kc\u0026externalid=kb29565" }, { "title": "CVE-2012-0870 Buffer overflow vulnerability in Samba", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0870_buffer_overflow" }, { "title": "Patch for BlackBerry PlayBook remote code execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34068" }, { "title": "Patch for BlackBerry PlayBook Tablet Samba File Sharing Remote Code Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/10751" }, { "title": "Samba Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=234413" }, { "title": "Red Hat: Critical: samba security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120332 - security advisory" }, { "title": "Ubuntu Security Notice: samba vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1374-1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "CNNVD", "id": "CNNVD-201202-439" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displaykc\u0026doctype=kc\u0026externalid=kb29565" }, { "trust": 2.0, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795509" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-1374-1" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48116" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48186" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5281" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48844" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48879" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73361" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" }, { "trust": 1.1, "url": "http://www.samba.org/samba/security/cve-2012-0870" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0870" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu692779/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0870" }, { "trust": 0.7, "url": "https://access.redhat.com/errata/rhsa-2012:0332" }, { "trust": 0.6, "url": "http://web.nvd.nist.gov/view/vuln/search-results?query=cve-2012-0870" }, { "trust": 0.6, "url": "http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displaykc" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2012-0870" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0870" }, { "trust": 0.4, "url": "https://rhn.redhat.com/errata/rhsa-2012-0332.html" }, { "trust": 0.3, "url": "http://www.samba.org" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://www.rsaconference.com/events/2012/usa/index.htm" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1374-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/52103" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48152" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48152/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48152/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.ngssecure.com" }, { "trust": 0.1, "url": "http://www.debian.org/security/2012/dsa-2414" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48066" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48066/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48066/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/3.0.28a-1ubuntu4.17" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0870.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2948" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0728" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2111" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1642" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3069" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0719" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2063" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1678" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201206-22.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0870" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0728" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1635" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0719" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1182" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1635" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1642" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2948" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1678" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3069" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2111" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "BID", "id": "52103" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "PACKETSTORM", "id": "110204" }, { "db": "PACKETSTORM", "id": "110292" }, { "db": "PACKETSTORM", "id": "110243" }, { "db": "PACKETSTORM", "id": "110098" }, { "db": "PACKETSTORM", "id": "110182" }, { "db": "PACKETSTORM", "id": "110140" }, { "db": "PACKETSTORM", "id": "114137" }, { "db": "CNNVD", "id": "CNNVD-201202-439" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-9013" }, { "db": "CNVD", "id": "CNVD-2012-0808" }, { "db": "VULMON", "id": "CVE-2012-0870" }, { "db": "BID", "id": "52103" }, { "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "db": "PACKETSTORM", "id": "110204" }, { "db": "PACKETSTORM", "id": "110292" }, { "db": "PACKETSTORM", "id": "110243" }, { "db": "PACKETSTORM", "id": "110098" }, { "db": "PACKETSTORM", "id": "110182" }, { "db": "PACKETSTORM", "id": "110140" }, { "db": "PACKETSTORM", "id": "114137" }, { "db": "CNNVD", "id": "CNNVD-201202-439" }, { "db": "NVD", "id": "CVE-2012-0870" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-9013" }, { "date": "2012-02-23T00:00:00", "db": "CNVD", "id": "CNVD-2012-0808" }, { "date": "2012-02-23T00:00:00", "db": "VULMON", "id": "CVE-2012-0870" }, { "date": "2012-02-21T00:00:00", "db": "BID", "id": "52103" }, { "date": "2012-02-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "date": "2012-02-26T09:58:15", "db": "PACKETSTORM", "id": "110204" }, { "date": "2012-02-28T15:18:00", "db": "PACKETSTORM", "id": "110292" }, { "date": "2012-02-27T14:22:22", "db": "PACKETSTORM", "id": "110243" }, { "date": "2012-02-22T09:06:52", "db": "PACKETSTORM", "id": "110098" }, { "date": "2012-02-24T22:59:46", "db": "PACKETSTORM", "id": "110182" }, { "date": "2012-02-24T03:48:42", "db": "PACKETSTORM", "id": "110140" }, { "date": "2012-06-24T23:53:49", "db": "PACKETSTORM", "id": "114137" }, { "date": "2012-02-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-439" }, { "date": "2012-02-23T12:33:55.407000", "db": "NVD", "id": "CVE-2012-0870" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-9013" }, { "date": "2012-02-23T00:00:00", "db": "CNVD", "id": "CNVD-2012-0808" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2012-0870" }, { "date": "2012-06-25T13:00:00", "db": "BID", "id": "52103" }, { "date": "2014-03-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003692" }, { "date": "2023-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-439" }, { "date": "2023-02-13T04:32:52.433000", "db": "NVD", "id": "CVE-2012-0870" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-439" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba of smbd Inside process.c Heap-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003692" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-439" } ], "trust": 0.6 } }
var-201904-0324
Vulnerability from variot
A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update. Samba Contains a permission vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. A local attacker can exploit this issue by gaining access to a world-readable file and extracting sensitive information from it. Information obtained may aid in other attacks. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. There is a security vulnerability in Samba, which originates from the fact that the program creates files in the private/ directory as globally writable. An attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0324", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "samba", "scope": "lt", "trust": 1.8, "vendor": "samba", "version": "4.10.2" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.9.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "29" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "6.1" }, { "model": "vs960hd", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "2.3.6-1720" }, { "model": "router manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "1.2" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.10.0" }, { "model": "directory server", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "skynas", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.9.6" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "30" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "5.2" }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.9 thats all 4.9.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.10.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.10" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "4.10.2" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "4.9.6" } ], "sources": [ { "db": "BID", "id": "107798" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.2", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.6", "versionStartIncluding": "4.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.3.6-1720", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-3870" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Bj??rn Baumbach", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-308" } ], "trust": 0.6 }, "cve": "CVE-2019-3870", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-3870", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-155305", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 4.2, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "secalert@redhat.com", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 4.2, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-3870", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-3870", "trust": 1.8, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2019-3870", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201904-308", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-155305", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-155305" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update. Samba Contains a permission vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. \nA local attacker can exploit this issue by gaining access to a world-readable file and extracting sensitive information from it. Information obtained may aid in other attacks. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. There is a security vulnerability in Samba, which originates from the fact that the program creates files in the private/ directory as globally writable. An attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "BID", "id": "107798" }, { "db": "VULHUB", "id": "VHN-155305" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3870", "trust": 2.8 }, { "db": "BID", "id": "107798", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2019-003309", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-308", "trust": 0.7 }, { "db": "NSFOCUS", "id": "43559", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-155305", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155305" }, { "db": "BID", "id": "107798" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "id": "VAR-201904-0324", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-155305" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:43:24.244000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FEDORA-2019-db21b5f1d2", "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354galk73czwqkfug7awb6eiegfmf62/" }, { "title": "FEDORA-2019-cacf88eabf", "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jtjvfa3rz6g2izdtvklhrmx6qbya4gpa/" }, { "title": "World writable files in Samba AD DC private/ dir", "trust": 0.8, "url": "https://www.samba.org/samba/security/cve-2019-3870.html" }, { "title": "Bug 13834", "trust": 0.8, "url": "https://bugzilla.samba.org/show_bug.cgi?id=13834" }, { "title": "Samba Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91147" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "CWE-275", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-155305" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://bugzilla.samba.org/show_bug.cgi?id=13834" }, { "trust": 2.0, "url": "https://www.samba.org/samba/security/cve-2019-3870.html" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-3870" }, { "trust": 1.7, "url": "https://support.f5.com/csp/article/k20804356" }, { "trust": 1.7, "url": "https://www.synology.com/security/advisory/synology_sa_19_15" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3870" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/107798" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6354galk73czwqkfug7awb6eiegfmf62/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jtjvfa3rz6g2izdtvklhrmx6qbya4gpa/" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689010" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2019-3870" }, { "trust": 0.9, "url": "http://www.samba.org" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3870" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jtjvfa3rz6g2izdtvklhrmx6qbya4gpa/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354galk73czwqkfug7awb6eiegfmf62/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/samba-privilege-escalation-via-ad-dc-world-writable-private-directory-28962" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/43559" } ], "sources": [ { "db": "VULHUB", "id": "VHN-155305" }, { "db": "BID", "id": "107798" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-155305" }, { "db": "BID", "id": "107798" }, { "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "db": "NVD", "id": "CVE-2019-3870" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-09T00:00:00", "db": "VULHUB", "id": "VHN-155305" }, { "date": "2019-04-08T00:00:00", "db": "BID", "id": "107798" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "date": "2019-04-09T16:29:01.867000", "db": "NVD", "id": "CVE-2019-3870" }, { "date": "2019-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-16T00:00:00", "db": "VULHUB", "id": "VHN-155305" }, { "date": "2019-04-08T00:00:00", "db": "BID", "id": "107798" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003309" }, { "date": "2023-11-07T03:10:15.880000", "db": "NVD", "id": "CVE-2019-3870" }, { "date": "2020-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-308" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "107798" }, { "db": "CNNVD", "id": "CNNVD-201904-308" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba Permissions vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003309" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-308" } ], "trust": 0.6 } }
var-202001-0554
Vulnerability from variot
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). samba Contains an out-of-bounds read vulnerability.Denial of service operation (DoS) May be in a state. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. A buffer error vulnerability exists in Samba versions 4.9.x prior to 4.9.18, 4.10.x prior to 4.10.12, and 4.11.x prior to 4.11.5. An attacker could exploit this vulnerability by sending a specially crafted string to cause a long-lived process to terminate. ========================================================================== Ubuntu Security Notice USN-4244-1 January 21, 2020
samba vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Samba.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-14907)
Christian Naumer discovered that Samba incorrectly handled DNS zone scavenging. This issue could possibly result in some incorrect data being written to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-19344)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: samba 2:4.10.7+dfsg-0ubuntu2.4
Ubuntu 19.04: samba 2:4.10.0+dfsg-0ubuntu2.8
Ubuntu 18.04 LTS: samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.15
Ubuntu 16.04 LTS: samba 2:4.3.11+dfsg-0ubuntu0.16.04.25
In general, a standard system update will make all the necessary changes. The Windows Explorer did not display the DFS redirects properly and instead of showing the redirects as directories, Samba displayed the redirects as files. With this fix, the Samba's vfs_glusterfs module has been fixed so that DFS redirects now work as expected.
For details on migrating Samba/CTDB configuration files, refer to:
https://access.redhat.com/solutions/4311261
-
Gentoo Linux Security Advisory GLSA 202003-52
https://security.gentoo.org/
Severity: Normal Title: Samba: Multiple vulnerabilities Date: March 25, 2020 Bugs: #664316, #672140, #686036, #693558, #702928, #706144 ID: 202003-52
Synopsis
Multiple vulnerabilities have been found in Samba, the worst of which could lead to remote code execution.
Background
Samba is a suite of SMB and CIFS client/server programs.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-fs/samba < 4.11.6 >= 4.9.18 >= 4.10.13 *>= 4.11.6
Description
Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could possibly execute arbitrary code, cause a Denial of Service condition, conduct a man-in-the-middle attack, or obtain sensitive information.
Workaround
There is no known workaround at this time.
Resolution
All Samba 4.9.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.9.18"
All Samba 4.10.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.10.13"
All Samba 4.11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.11.6"
References
[ 1 ] CVE-2018-10858 https://nvd.nist.gov/vuln/detail/CVE-2018-10858 [ 2 ] CVE-2018-10918 https://nvd.nist.gov/vuln/detail/CVE-2018-10918 [ 3 ] CVE-2018-10919 https://nvd.nist.gov/vuln/detail/CVE-2018-10919 [ 4 ] CVE-2018-1139 https://nvd.nist.gov/vuln/detail/CVE-2018-1139 [ 5 ] CVE-2018-1140 https://nvd.nist.gov/vuln/detail/CVE-2018-1140 [ 6 ] CVE-2018-14629 https://nvd.nist.gov/vuln/detail/CVE-2018-14629 [ 7 ] CVE-2018-16841 https://nvd.nist.gov/vuln/detail/CVE-2018-16841 [ 8 ] CVE-2018-16851 https://nvd.nist.gov/vuln/detail/CVE-2018-16851 [ 9 ] CVE-2018-16852 https://nvd.nist.gov/vuln/detail/CVE-2018-16852 [ 10 ] CVE-2018-16853 https://nvd.nist.gov/vuln/detail/CVE-2018-16853 [ 11 ] CVE-2018-16857 https://nvd.nist.gov/vuln/detail/CVE-2018-16857 [ 12 ] CVE-2018-16860 https://nvd.nist.gov/vuln/detail/CVE-2018-16860 [ 13 ] CVE-2019-10197 https://nvd.nist.gov/vuln/detail/CVE-2019-10197 [ 14 ] CVE-2019-14861 https://nvd.nist.gov/vuln/detail/CVE-2019-14861 [ 15 ] CVE-2019-14870 https://nvd.nist.gov/vuln/detail/CVE-2019-14870 [ 16 ] CVE-2019-14902 https://nvd.nist.gov/vuln/detail/CVE-2019-14902 [ 17 ] CVE-2019-14907 https://nvd.nist.gov/vuln/detail/CVE-2019-14907 [ 18 ] CVE-2019-19344 https://nvd.nist.gov/vuln/detail/CVE-2019-19344
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202003-52
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: samba security, bug fix, and enhancement update Advisory ID: RHSA-2020:3981-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3981 Issue date: 2020-09-29 CVE Names: CVE-2019-14907 ==================================================================== 1. Summary:
An update for samba is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
The following packages have been upgraded to a later upstream version: samba (4.10.16).
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1737888 - Libwbclient alternatives manual setting lost 1776333 - CLI tools printing "Unable to initialize messaging context" running as non root 1785121 - Rebase Samba to the the latest 4.10.x maintenance release 1791207 - CVE-2019-14907 samba: Crash after failed character conversion at log level 3 or above 1791823 - wbinfo -K doesn't work for users of trusted domains/forests 1801496 - Missing directories in ctdb package 1813017 - Can't get 'log events generated from smbclient' 1828354 - After adding "additional dns hostname" to smb.conf it does not generate /etc/krb5.keytab with the proper SPN. 1828924 - Fix 'require_membership_of' documentation in pam_winbind manpages 1831986 - unprivileged user should be able to read-only to gencache.tdb instead of permission denied 1836427 - net ads join use of netbios+realm breaks GSSAPI authentication
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: samba-4.10.16-5.el7.src.rpm
noarch: samba-common-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: samba-pidl-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: samba-4.10.16-5.el7.src.rpm
noarch: samba-common-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: samba-pidl-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: samba-4.10.16-5.el7.src.rpm
noarch: samba-common-4.10.16-5.el7.noarch.rpm
ppc64: libsmbclient-4.10.16-5.el7.ppc.rpm libsmbclient-4.10.16-5.el7.ppc64.rpm libwbclient-4.10.16-5.el7.ppc.rpm libwbclient-4.10.16-5.el7.ppc64.rpm samba-4.10.16-5.el7.ppc64.rpm samba-client-4.10.16-5.el7.ppc64.rpm samba-client-libs-4.10.16-5.el7.ppc.rpm samba-client-libs-4.10.16-5.el7.ppc64.rpm samba-common-libs-4.10.16-5.el7.ppc.rpm samba-common-libs-4.10.16-5.el7.ppc64.rpm samba-common-tools-4.10.16-5.el7.ppc64.rpm samba-debuginfo-4.10.16-5.el7.ppc.rpm samba-debuginfo-4.10.16-5.el7.ppc64.rpm samba-krb5-printing-4.10.16-5.el7.ppc64.rpm samba-libs-4.10.16-5.el7.ppc.rpm samba-libs-4.10.16-5.el7.ppc64.rpm samba-winbind-4.10.16-5.el7.ppc64.rpm samba-winbind-clients-4.10.16-5.el7.ppc64.rpm samba-winbind-modules-4.10.16-5.el7.ppc.rpm samba-winbind-modules-4.10.16-5.el7.ppc64.rpm
ppc64le: libsmbclient-4.10.16-5.el7.ppc64le.rpm libwbclient-4.10.16-5.el7.ppc64le.rpm samba-4.10.16-5.el7.ppc64le.rpm samba-client-4.10.16-5.el7.ppc64le.rpm samba-client-libs-4.10.16-5.el7.ppc64le.rpm samba-common-libs-4.10.16-5.el7.ppc64le.rpm samba-common-tools-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm samba-krb5-printing-4.10.16-5.el7.ppc64le.rpm samba-libs-4.10.16-5.el7.ppc64le.rpm samba-winbind-4.10.16-5.el7.ppc64le.rpm samba-winbind-clients-4.10.16-5.el7.ppc64le.rpm samba-winbind-modules-4.10.16-5.el7.ppc64le.rpm
s390x: libsmbclient-4.10.16-5.el7.s390.rpm libsmbclient-4.10.16-5.el7.s390x.rpm libwbclient-4.10.16-5.el7.s390.rpm libwbclient-4.10.16-5.el7.s390x.rpm samba-4.10.16-5.el7.s390x.rpm samba-client-4.10.16-5.el7.s390x.rpm samba-client-libs-4.10.16-5.el7.s390.rpm samba-client-libs-4.10.16-5.el7.s390x.rpm samba-common-libs-4.10.16-5.el7.s390.rpm samba-common-libs-4.10.16-5.el7.s390x.rpm samba-common-tools-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm samba-krb5-printing-4.10.16-5.el7.s390x.rpm samba-libs-4.10.16-5.el7.s390.rpm samba-libs-4.10.16-5.el7.s390x.rpm samba-winbind-4.10.16-5.el7.s390x.rpm samba-winbind-clients-4.10.16-5.el7.s390x.rpm samba-winbind-modules-4.10.16-5.el7.s390.rpm samba-winbind-modules-4.10.16-5.el7.s390x.rpm
x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Server Resilient Storage (v. 7):
ppc64le: ctdb-4.10.16-5.el7.ppc64le.rpm ctdb-tests-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm
s390x: ctdb-4.10.16-5.el7.s390x.rpm ctdb-tests-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm
x86_64: ctdb-4.10.16-5.el7.x86_64.rpm ctdb-tests-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: samba-pidl-4.10.16-5.el7.noarch.rpm
ppc64: libsmbclient-devel-4.10.16-5.el7.ppc.rpm libsmbclient-devel-4.10.16-5.el7.ppc64.rpm libwbclient-devel-4.10.16-5.el7.ppc.rpm libwbclient-devel-4.10.16-5.el7.ppc64.rpm samba-dc-4.10.16-5.el7.ppc64.rpm samba-dc-libs-4.10.16-5.el7.ppc64.rpm samba-debuginfo-4.10.16-5.el7.ppc.rpm samba-debuginfo-4.10.16-5.el7.ppc64.rpm samba-devel-4.10.16-5.el7.ppc.rpm samba-devel-4.10.16-5.el7.ppc64.rpm samba-python-4.10.16-5.el7.ppc.rpm samba-python-4.10.16-5.el7.ppc64.rpm samba-python-test-4.10.16-5.el7.ppc64.rpm samba-test-4.10.16-5.el7.ppc64.rpm samba-test-libs-4.10.16-5.el7.ppc.rpm samba-test-libs-4.10.16-5.el7.ppc64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.ppc64.rpm
ppc64le: libsmbclient-devel-4.10.16-5.el7.ppc64le.rpm libwbclient-devel-4.10.16-5.el7.ppc64le.rpm samba-dc-4.10.16-5.el7.ppc64le.rpm samba-dc-libs-4.10.16-5.el7.ppc64le.rpm samba-debuginfo-4.10.16-5.el7.ppc64le.rpm samba-devel-4.10.16-5.el7.ppc64le.rpm samba-python-4.10.16-5.el7.ppc64le.rpm samba-python-test-4.10.16-5.el7.ppc64le.rpm samba-test-4.10.16-5.el7.ppc64le.rpm samba-test-libs-4.10.16-5.el7.ppc64le.rpm samba-winbind-krb5-locator-4.10.16-5.el7.ppc64le.rpm
s390x: libsmbclient-devel-4.10.16-5.el7.s390.rpm libsmbclient-devel-4.10.16-5.el7.s390x.rpm libwbclient-devel-4.10.16-5.el7.s390.rpm libwbclient-devel-4.10.16-5.el7.s390x.rpm samba-dc-4.10.16-5.el7.s390x.rpm samba-dc-libs-4.10.16-5.el7.s390x.rpm samba-debuginfo-4.10.16-5.el7.s390.rpm samba-debuginfo-4.10.16-5.el7.s390x.rpm samba-devel-4.10.16-5.el7.s390.rpm samba-devel-4.10.16-5.el7.s390x.rpm samba-python-4.10.16-5.el7.s390.rpm samba-python-4.10.16-5.el7.s390x.rpm samba-python-test-4.10.16-5.el7.s390x.rpm samba-test-4.10.16-5.el7.s390x.rpm samba-test-libs-4.10.16-5.el7.s390.rpm samba-test-libs-4.10.16-5.el7.s390x.rpm samba-winbind-krb5-locator-4.10.16-5.el7.s390x.rpm
x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: samba-4.10.16-5.el7.src.rpm
noarch: samba-common-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-4.10.16-5.el7.i686.rpm libsmbclient-4.10.16-5.el7.x86_64.rpm libwbclient-4.10.16-5.el7.i686.rpm libwbclient-4.10.16-5.el7.x86_64.rpm samba-4.10.16-5.el7.x86_64.rpm samba-client-4.10.16-5.el7.x86_64.rpm samba-client-libs-4.10.16-5.el7.i686.rpm samba-client-libs-4.10.16-5.el7.x86_64.rpm samba-common-libs-4.10.16-5.el7.i686.rpm samba-common-libs-4.10.16-5.el7.x86_64.rpm samba-common-tools-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-krb5-printing-4.10.16-5.el7.x86_64.rpm samba-libs-4.10.16-5.el7.i686.rpm samba-libs-4.10.16-5.el7.x86_64.rpm samba-python-4.10.16-5.el7.i686.rpm samba-python-4.10.16-5.el7.x86_64.rpm samba-winbind-4.10.16-5.el7.x86_64.rpm samba-winbind-clients-4.10.16-5.el7.x86_64.rpm samba-winbind-modules-4.10.16-5.el7.i686.rpm samba-winbind-modules-4.10.16-5.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: samba-pidl-4.10.16-5.el7.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-5.el7.i686.rpm libsmbclient-devel-4.10.16-5.el7.x86_64.rpm libwbclient-devel-4.10.16-5.el7.i686.rpm libwbclient-devel-4.10.16-5.el7.x86_64.rpm samba-dc-4.10.16-5.el7.x86_64.rpm samba-dc-libs-4.10.16-5.el7.x86_64.rpm samba-debuginfo-4.10.16-5.el7.i686.rpm samba-debuginfo-4.10.16-5.el7.x86_64.rpm samba-devel-4.10.16-5.el7.i686.rpm samba-devel-4.10.16-5.el7.x86_64.rpm samba-python-test-4.10.16-5.el7.x86_64.rpm samba-test-4.10.16-5.el7.x86_64.rpm samba-test-libs-4.10.16-5.el7.i686.rpm samba-test-libs-4.10.16-5.el7.x86_64.rpm samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-14907 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX3OhAdzjgjWX9erEAQiKmg//Zm9RRxpptm9hbO8JP2LaIP6kkQrv18HL a/jBhSlHnueskPF4aiJ5vlncq4rZ702MwyFeudzYX7qTuDQY5XvzxiA6Q9E8r/J0 eQicSIc/rexQUBiKmnDg6qdK24eW81BYl6ieIqdqw8W5hnXGTChamgOpvhPIyRx+ ZuLep8AH0v1Ond7o4Vxxs2B8tpKh/bQ+jcMF3wZg8DhsqbWeOQAqkCz/glfD1Am2 gUdfwSVmPyPoCP9flNiULVWnAwTb9JqSIiaPCdqLwusm/BcA1Lpl1D829L0kmpTi cnlKi18hjgFLjij/6dobEfjpUq7b+2HWBuAu8ng2R1hU/v9fxxlnp9vZT6EWns2E +1v6HSdnQrCA31s7SX4LvXHyNte1NIaht+uNfptl0J2PSowRCzBD516fQGoglJIH 4gI5Lb5/w2zEgP09bLP8blP0CztyeKA+T5RGXU/U3zHrCbJx3MK5fgeHeAHhB0EC YKRuNpXXKynv+DSM+OysZOe+X53/oBG8c4qgKT9O+ifgcB+tiLzcOJXq3odGCnv6 yPfkDhF2hBtOPdvOvig7T8MsFVyEO0Cpm963iagz7P1yiR9C/ZW0lJ2unHse6J3k sNCwGHNwTCMwF5cO74vFO9ro/Jys4Vb8+81mVnm9aHSG3/BiLqLRHMxcpAVc6eXG NXdH6tbOksI=Mk7x -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Bugs fixed (https://bugzilla.redhat.com/):
1710980 - [RFE] Add support for Kerberos KCM credential cache in pam_winbind/winbindd 1746225 - CVE-2019-10197 samba: Combination of parameters and permissions can allow user to escape from the share path definition 1754409 - Rebase Samba to 4.11.x 1754575 - samba: Remove NSS wins and winbind dependency on librt/libpthread as workaround for glibc defect
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0554", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "skynas", "scope": "eq", "trust": 1.8, "vendor": "synology", "version": null }, { "model": "directory server", "scope": "eq", "trust": 1.8, "vendor": "synology", "version": null }, { "model": "storage", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "diskstation manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.10.12" }, { "model": "router manager", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": "1.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.11.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "30" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.11.5" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.9.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.9.18" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.10.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.10" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.04" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.11.x" }, { "model": "diskstation manager", "scope": "eq", "trust": 0.8, "vendor": "synology", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "project" }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.11.5" }, { "model": "router manager", "scope": "eq", "trust": 0.8, "vendor": "synology", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.10.12" }, { "model": "red hat enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "red hat storage", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.8, "vendor": "samba", "version": "4.9.18" }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.10.x" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "samba", "scope": "lt", "trust": 0.8, "vendor": "samba", "version": "4.9.x" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "NVD", "id": "CVE-2019-14907" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.18", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.12", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.11.5", "versionStartIncluding": "4.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-14907" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,Red Hat,Gentoo", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-903" } ], "trust": 0.6 }, "cve": "CVE-2019-14907", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-14907", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "VHN-146900", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "CVE-2019-14907", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-14907", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-14907", "trust": 1.0, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2019-14907", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-14907", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202001-903", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-146900", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2019-14907", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-146900" }, { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with \"log level = 3\" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). samba Contains an out-of-bounds read vulnerability.Denial of service operation (DoS) May be in a state. Samba is a set of free software developed by the Samba team that enables the UNIX series of operating systems to connect with the SMB/CIFS network protocol of the Microsoft Windows operating system. The software supports sharing printers, transferring data files and so on. A buffer error vulnerability exists in Samba versions 4.9.x prior to 4.9.18, 4.10.x prior to 4.10.12, and 4.11.x prior to 4.11.5. An attacker could exploit this vulnerability by sending a specially crafted string to cause a long-lived process to terminate. ==========================================================================\nUbuntu Security Notice USN-4244-1\nJanuary 21, 2020\n\nsamba vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Samba. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nIt was discovered that Samba did not automatically replicate ACLs set to\ninherit down a subtree on AD Directory, contrary to expectations. This\nissue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-14907)\n\nChristian Naumer discovered that Samba incorrectly handled DNS zone\nscavenging. This issue could possibly result in some incorrect data being\nwritten to the DB. This issue only applied to Ubuntu 19.04 and Ubuntu\n19.10. (CVE-2019-19344)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n samba 2:4.10.7+dfsg-0ubuntu2.4\n\nUbuntu 19.04:\n samba 2:4.10.0+dfsg-0ubuntu2.8\n\nUbuntu 18.04 LTS:\n samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.15\n\nUbuntu 16.04 LTS:\n samba 2:4.3.11+dfsg-0ubuntu0.16.04.25\n\nIn general, a standard system update will make all the necessary changes. The Windows Explorer did\nnot display the DFS redirects properly and instead of showing the redirects\nas directories, Samba displayed the redirects as files. With this fix, the\nSamba\u0027s vfs_glusterfs module has been fixed so that DFS redirects now work\nas expected. \n\nFor details on migrating Samba/CTDB configuration files, refer to: \n\nhttps://access.redhat.com/solutions/4311261\n\n5. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202003-52\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Samba: Multiple vulnerabilities\n Date: March 25, 2020\n Bugs: #664316, #672140, #686036, #693558, #702928, #706144\n ID: 202003-52\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Samba, the worst of which\ncould lead to remote code execution. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-fs/samba \u003c 4.11.6 *\u003e= 4.9.18\n *\u003e= 4.10.13\n *\u003e= 4.11.6\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code, cause a Denial\nof Service condition, conduct a man-in-the-middle attack, or obtain\nsensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba 4.9.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.9.18\"\n\nAll Samba 4.10.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.10.13\"\n\nAll Samba 4.11.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.11.6\"\n\nReferences\n==========\n\n[ 1 ] CVE-2018-10858\n https://nvd.nist.gov/vuln/detail/CVE-2018-10858\n[ 2 ] CVE-2018-10918\n https://nvd.nist.gov/vuln/detail/CVE-2018-10918\n[ 3 ] CVE-2018-10919\n https://nvd.nist.gov/vuln/detail/CVE-2018-10919\n[ 4 ] CVE-2018-1139\n https://nvd.nist.gov/vuln/detail/CVE-2018-1139\n[ 5 ] CVE-2018-1140\n https://nvd.nist.gov/vuln/detail/CVE-2018-1140\n[ 6 ] CVE-2018-14629\n https://nvd.nist.gov/vuln/detail/CVE-2018-14629\n[ 7 ] CVE-2018-16841\n https://nvd.nist.gov/vuln/detail/CVE-2018-16841\n[ 8 ] CVE-2018-16851\n https://nvd.nist.gov/vuln/detail/CVE-2018-16851\n[ 9 ] CVE-2018-16852\n https://nvd.nist.gov/vuln/detail/CVE-2018-16852\n[ 10 ] CVE-2018-16853\n https://nvd.nist.gov/vuln/detail/CVE-2018-16853\n[ 11 ] CVE-2018-16857\n https://nvd.nist.gov/vuln/detail/CVE-2018-16857\n[ 12 ] CVE-2018-16860\n https://nvd.nist.gov/vuln/detail/CVE-2018-16860\n[ 13 ] CVE-2019-10197\n https://nvd.nist.gov/vuln/detail/CVE-2019-10197\n[ 14 ] CVE-2019-14861\n https://nvd.nist.gov/vuln/detail/CVE-2019-14861\n[ 15 ] CVE-2019-14870\n https://nvd.nist.gov/vuln/detail/CVE-2019-14870\n[ 16 ] CVE-2019-14902\n https://nvd.nist.gov/vuln/detail/CVE-2019-14902\n[ 17 ] CVE-2019-14907\n https://nvd.nist.gov/vuln/detail/CVE-2019-14907\n[ 18 ] CVE-2019-19344\n https://nvd.nist.gov/vuln/detail/CVE-2019-19344\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202003-52\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: samba security, bug fix, and enhancement update\nAdvisory ID: RHSA-2020:3981-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:3981\nIssue date: 2020-09-29\nCVE Names: CVE-2019-14907\n====================================================================\n1. Summary:\n\nAn update for samba is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB)\nprotocol and the related Common Internet File System (CIFS) protocol, which\nallow PC-compatible machines to share files, printers, and various\ninformation. \n\nThe following packages have been upgraded to a later upstream version:\nsamba (4.10.16). \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.9 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the smb service will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1737888 - Libwbclient alternatives manual setting lost\n1776333 - CLI tools printing \"Unable to initialize messaging context\" running as non root\n1785121 - Rebase Samba to the the latest 4.10.x maintenance release\n1791207 - CVE-2019-14907 samba: Crash after failed character conversion at log level 3 or above\n1791823 - wbinfo -K doesn\u0027t work for users of trusted domains/forests\n1801496 - Missing directories in ctdb package\n1813017 - Can\u0027t get \u0027log events generated from smbclient\u0027\n1828354 - After adding \"additional dns hostname\" to smb.conf it does not generate /etc/krb5.keytab with the proper SPN. \n1828924 - Fix \u0027require_membership_of\u0027 documentation in pam_winbind manpages\n1831986 - unprivileged user should be able to read-only to gencache.tdb instead of permission denied\n1836427 - net ads join use of netbios+realm breaks GSSAPI authentication\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nppc64:\nlibsmbclient-4.10.16-5.el7.ppc.rpm\nlibsmbclient-4.10.16-5.el7.ppc64.rpm\nlibwbclient-4.10.16-5.el7.ppc.rpm\nlibwbclient-4.10.16-5.el7.ppc64.rpm\nsamba-4.10.16-5.el7.ppc64.rpm\nsamba-client-4.10.16-5.el7.ppc64.rpm\nsamba-client-libs-4.10.16-5.el7.ppc.rpm\nsamba-client-libs-4.10.16-5.el7.ppc64.rpm\nsamba-common-libs-4.10.16-5.el7.ppc.rpm\nsamba-common-libs-4.10.16-5.el7.ppc64.rpm\nsamba-common-tools-4.10.16-5.el7.ppc64.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64.rpm\nsamba-krb5-printing-4.10.16-5.el7.ppc64.rpm\nsamba-libs-4.10.16-5.el7.ppc.rpm\nsamba-libs-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-clients-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc64.rpm\n\nppc64le:\nlibsmbclient-4.10.16-5.el7.ppc64le.rpm\nlibwbclient-4.10.16-5.el7.ppc64le.rpm\nsamba-4.10.16-5.el7.ppc64le.rpm\nsamba-client-4.10.16-5.el7.ppc64le.rpm\nsamba-client-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-common-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-common-tools-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\nsamba-krb5-printing-4.10.16-5.el7.ppc64le.rpm\nsamba-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-clients-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-modules-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nlibsmbclient-4.10.16-5.el7.s390.rpm\nlibsmbclient-4.10.16-5.el7.s390x.rpm\nlibwbclient-4.10.16-5.el7.s390.rpm\nlibwbclient-4.10.16-5.el7.s390x.rpm\nsamba-4.10.16-5.el7.s390x.rpm\nsamba-client-4.10.16-5.el7.s390x.rpm\nsamba-client-libs-4.10.16-5.el7.s390.rpm\nsamba-client-libs-4.10.16-5.el7.s390x.rpm\nsamba-common-libs-4.10.16-5.el7.s390.rpm\nsamba-common-libs-4.10.16-5.el7.s390x.rpm\nsamba-common-tools-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\nsamba-krb5-printing-4.10.16-5.el7.s390x.rpm\nsamba-libs-4.10.16-5.el7.s390.rpm\nsamba-libs-4.10.16-5.el7.s390x.rpm\nsamba-winbind-4.10.16-5.el7.s390x.rpm\nsamba-winbind-clients-4.10.16-5.el7.s390x.rpm\nsamba-winbind-modules-4.10.16-5.el7.s390.rpm\nsamba-winbind-modules-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Resilient Storage (v. 7):\n\nppc64le:\nctdb-4.10.16-5.el7.ppc64le.rpm\nctdb-tests-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nctdb-4.10.16-5.el7.s390x.rpm\nctdb-tests-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nctdb-4.10.16-5.el7.x86_64.rpm\nctdb-tests-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nppc64:\nlibsmbclient-devel-4.10.16-5.el7.ppc.rpm\nlibsmbclient-devel-4.10.16-5.el7.ppc64.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc64.rpm\nsamba-dc-4.10.16-5.el7.ppc64.rpm\nsamba-dc-libs-4.10.16-5.el7.ppc64.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64.rpm\nsamba-devel-4.10.16-5.el7.ppc.rpm\nsamba-devel-4.10.16-5.el7.ppc64.rpm\nsamba-python-4.10.16-5.el7.ppc.rpm\nsamba-python-4.10.16-5.el7.ppc64.rpm\nsamba-python-test-4.10.16-5.el7.ppc64.rpm\nsamba-test-4.10.16-5.el7.ppc64.rpm\nsamba-test-libs-4.10.16-5.el7.ppc.rpm\nsamba-test-libs-4.10.16-5.el7.ppc64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.ppc64.rpm\n\nppc64le:\nlibsmbclient-devel-4.10.16-5.el7.ppc64le.rpm\nlibwbclient-devel-4.10.16-5.el7.ppc64le.rpm\nsamba-dc-4.10.16-5.el7.ppc64le.rpm\nsamba-dc-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-debuginfo-4.10.16-5.el7.ppc64le.rpm\nsamba-devel-4.10.16-5.el7.ppc64le.rpm\nsamba-python-4.10.16-5.el7.ppc64le.rpm\nsamba-python-test-4.10.16-5.el7.ppc64le.rpm\nsamba-test-4.10.16-5.el7.ppc64le.rpm\nsamba-test-libs-4.10.16-5.el7.ppc64le.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.ppc64le.rpm\n\ns390x:\nlibsmbclient-devel-4.10.16-5.el7.s390.rpm\nlibsmbclient-devel-4.10.16-5.el7.s390x.rpm\nlibwbclient-devel-4.10.16-5.el7.s390.rpm\nlibwbclient-devel-4.10.16-5.el7.s390x.rpm\nsamba-dc-4.10.16-5.el7.s390x.rpm\nsamba-dc-libs-4.10.16-5.el7.s390x.rpm\nsamba-debuginfo-4.10.16-5.el7.s390.rpm\nsamba-debuginfo-4.10.16-5.el7.s390x.rpm\nsamba-devel-4.10.16-5.el7.s390.rpm\nsamba-devel-4.10.16-5.el7.s390x.rpm\nsamba-python-4.10.16-5.el7.s390.rpm\nsamba-python-4.10.16-5.el7.s390x.rpm\nsamba-python-test-4.10.16-5.el7.s390x.rpm\nsamba-test-4.10.16-5.el7.s390x.rpm\nsamba-test-libs-4.10.16-5.el7.s390.rpm\nsamba-test-libs-4.10.16-5.el7.s390x.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nsamba-4.10.16-5.el7.src.rpm\n\nnoarch:\nsamba-common-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-5.el7.i686.rpm\nlibsmbclient-4.10.16-5.el7.x86_64.rpm\nlibwbclient-4.10.16-5.el7.i686.rpm\nlibwbclient-4.10.16-5.el7.x86_64.rpm\nsamba-4.10.16-5.el7.x86_64.rpm\nsamba-client-4.10.16-5.el7.x86_64.rpm\nsamba-client-libs-4.10.16-5.el7.i686.rpm\nsamba-client-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-libs-4.10.16-5.el7.i686.rpm\nsamba-common-libs-4.10.16-5.el7.x86_64.rpm\nsamba-common-tools-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-krb5-printing-4.10.16-5.el7.x86_64.rpm\nsamba-libs-4.10.16-5.el7.i686.rpm\nsamba-libs-4.10.16-5.el7.x86_64.rpm\nsamba-python-4.10.16-5.el7.i686.rpm\nsamba-python-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-clients-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-modules-4.10.16-5.el7.i686.rpm\nsamba-winbind-modules-4.10.16-5.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-5.el7.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-5.el7.i686.rpm\nlibsmbclient-devel-4.10.16-5.el7.x86_64.rpm\nlibwbclient-devel-4.10.16-5.el7.i686.rpm\nlibwbclient-devel-4.10.16-5.el7.x86_64.rpm\nsamba-dc-4.10.16-5.el7.x86_64.rpm\nsamba-dc-libs-4.10.16-5.el7.x86_64.rpm\nsamba-debuginfo-4.10.16-5.el7.i686.rpm\nsamba-debuginfo-4.10.16-5.el7.x86_64.rpm\nsamba-devel-4.10.16-5.el7.i686.rpm\nsamba-devel-4.10.16-5.el7.x86_64.rpm\nsamba-python-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-4.10.16-5.el7.x86_64.rpm\nsamba-test-libs-4.10.16-5.el7.i686.rpm\nsamba-test-libs-4.10.16-5.el7.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-14907\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBX3OhAdzjgjWX9erEAQiKmg//Zm9RRxpptm9hbO8JP2LaIP6kkQrv18HL\na/jBhSlHnueskPF4aiJ5vlncq4rZ702MwyFeudzYX7qTuDQY5XvzxiA6Q9E8r/J0\neQicSIc/rexQUBiKmnDg6qdK24eW81BYl6ieIqdqw8W5hnXGTChamgOpvhPIyRx+\nZuLep8AH0v1Ond7o4Vxxs2B8tpKh/bQ+jcMF3wZg8DhsqbWeOQAqkCz/glfD1Am2\ngUdfwSVmPyPoCP9flNiULVWnAwTb9JqSIiaPCdqLwusm/BcA1Lpl1D829L0kmpTi\ncnlKi18hjgFLjij/6dobEfjpUq7b+2HWBuAu8ng2R1hU/v9fxxlnp9vZT6EWns2E\n+1v6HSdnQrCA31s7SX4LvXHyNte1NIaht+uNfptl0J2PSowRCzBD516fQGoglJIH\n4gI5Lb5/w2zEgP09bLP8blP0CztyeKA+T5RGXU/U3zHrCbJx3MK5fgeHeAHhB0EC\nYKRuNpXXKynv+DSM+OysZOe+X53/oBG8c4qgKT9O+ifgcB+tiLzcOJXq3odGCnv6\nyPfkDhF2hBtOPdvOvig7T8MsFVyEO0Cpm963iagz7P1yiR9C/ZW0lJ2unHse6J3k\nsNCwGHNwTCMwF5cO74vFO9ro/Jys4Vb8+81mVnm9aHSG3/BiLqLRHMxcpAVc6eXG\nNXdH6tbOksI=Mk7x\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1710980 - [RFE] Add support for Kerberos KCM credential cache in pam_winbind/winbindd\n1746225 - CVE-2019-10197 samba: Combination of parameters and permissions can allow user to escape from the share path definition\n1754409 - Rebase Samba to 4.11.x\n1754575 - samba: Remove NSS wins and winbind dependency on librt/libpthread as workaround for glibc defect", "sources": [ { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "VULHUB", "id": "VHN-146900" }, { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156871" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "PACKETSTORM", "id": "159357" }, { "db": "PACKETSTORM", "id": "157427" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14907", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "159357", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014366", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202001-903", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156018", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156871", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156915", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "157427", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.1852", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3349", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1478", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0319", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1031", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0297", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-146900", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-14907", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146900" }, { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156871" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "PACKETSTORM", "id": "159357" }, { "db": "PACKETSTORM", "id": "157427" }, { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "id": "VAR-202001-0554", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-146900" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:18:05.532000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Bug\u00a01791207", "trust": 0.8, "url": "https://usn.ubuntu.com/4244-1/" }, { "title": "Samba Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109218" }, { "title": "Red Hat: Moderate: samba security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20203981 - security advisory" }, { "title": "Red Hat: Moderate: samba security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20200943 - security advisory" }, { "title": "Red Hat: Moderate: samba security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20201878 - security advisory" }, { "title": "Ubuntu Security Notice: samba vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4244-1" }, { "title": "Amazon Linux AMI: ALAS-2020-1452", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2020-1452" }, { "title": "Amazon Linux 2: ALAS2-2020-1544", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2020-1544" }, { "title": "CVE-2019-14907", "trust": 0.1, "url": "https://github.com/jamesgeee/cve-2019-14907 " }, { "title": "lllnx", "trust": 0.1, "url": "https://github.com/lllnx/lllnx " }, { "title": "", "trust": 0.1, "url": "https://github.com/ep-infosec/50_google_honggfuzz " }, { "title": "honggfuzz", "trust": 0.1, "url": "https://github.com/google/honggfuzz " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out of bounds read (CWE-125) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146900" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "NVD", "id": "CVE-2019-14907" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://security.gentoo.org/glsa/202003-52" }, { "trust": 1.9, "url": "https://usn.ubuntu.com/4244-1/" }, { "trust": 1.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14907" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-14907" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20200122-0001/" }, { "trust": 1.8, "url": "https://www.synology.com/security/advisory/synology_sa_20_01" }, { "trust": 1.8, "url": "https://www.samba.org/samba/security/cve-2019-14907.html" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html" }, { "trust": 1.0, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2019-14907" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/gq6u65i2k23yjc4fesw477wl55tu3ppt/" }, { "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4aczvnmifqggxnjpmhavbn3h2u65fxqy/" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200233-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159357/red-hat-security-advisory-2020-3981-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1478/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157427/red-hat-security-advisory-2020-1878-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-samba-affects-ibm-spectrum-scale-smb-protocol-access-method-cve-2019-14907/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3349/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156018/ubuntu-security-notice-usn-4244-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156915/gentoo-linux-security-advisory-202003-52.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1852" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-6/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-samba-vulnerability-issue-on-ibm-storwize-v7000-unified-cve-2019-14907/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0319/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0297/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156871/red-hat-security-advisory-2020-0943-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1031/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/samba-three-vulnerabilities-31386" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2020:3981" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14902" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19344" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-10218" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10218" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10197" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.25" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4244-1" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/4311261" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:0943" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16857" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10918" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16860" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14629" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16851" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10858" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16852" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10919" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1140" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14870" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1139" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10197" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:1878" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" } ], "sources": [ { "db": "VULHUB", "id": "VHN-146900" }, { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156871" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "PACKETSTORM", "id": "159357" }, { "db": "PACKETSTORM", "id": "157427" }, { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-146900" }, { "db": "VULMON", "id": "CVE-2019-14907" }, { "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156871" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "PACKETSTORM", "id": "159357" }, { "db": "PACKETSTORM", "id": "157427" }, { "db": "NVD", "id": "CVE-2019-14907" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-21T00:00:00", "db": "VULHUB", "id": "VHN-146900" }, { "date": "2020-01-21T00:00:00", "db": "VULMON", "id": "CVE-2019-14907" }, { "date": "2020-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "date": "2020-01-21T19:09:24", "db": "PACKETSTORM", "id": "156018" }, { "date": "2020-03-23T16:14:36", "db": "PACKETSTORM", "id": "156871" }, { "date": "2020-03-26T14:45:19", "db": "PACKETSTORM", "id": "156915" }, { "date": "2020-09-30T15:44:56", "db": "PACKETSTORM", "id": "159357" }, { "date": "2020-04-28T20:21:10", "db": "PACKETSTORM", "id": "157427" }, { "date": "2020-01-21T18:15:12.717000", "db": "NVD", "id": "CVE-2019-14907" }, { "date": "2020-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-10T00:00:00", "db": "VULHUB", "id": "VHN-146900" }, { "date": "2022-11-16T00:00:00", "db": "VULMON", "id": "CVE-2019-14907" }, { "date": "2020-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014366" }, { "date": "2023-11-07T03:05:22.540000", "db": "NVD", "id": "CVE-2019-14907" }, { "date": "2021-06-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-903" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "156018" }, { "db": "PACKETSTORM", "id": "156915" }, { "db": "CNNVD", "id": "CNNVD-202001-903" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "samba\u00a0 Vulnerable to out-of-bounds reading", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014366" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-903" } ], "trust": 0.6 } }
var-202201-0295
Vulnerability from variot
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of AppleDouble entries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer.
The specific flaw exists within the parsing of EA metadata when opening files in smbd.
The problem in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file. If both options are set to different settings than the default values, the system is not affected by the security issue.
================== Patch Availability ==================
Patches addressing both these issues have been posted to:
https://www.samba.org/samba/security/
Additionally, Samba 4.13.17, 4.14.12 and 4.15.5 have been issued as security releases to correct the defect.
================== CVSSv3 calculation ==================
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
Base score 9.9.
========== Workaround ==========
As a workaround remove the "fruit" VFS module from the list of configured VFS objects in any "vfs objects" line in the Samba configuration smb.conf.
Note that changing the VFS module settings fruit:metadata or fruit:resource to use the unaffected setting causes all stored information to be inaccessible and will make it appear to macOS clients as if the information is lost.
======= Credits =======
Originally reported by Orange Tsai from DEVCORE.
Patches provided by Ralph Böhme of the Samba team.
========================================================== == Our Code, Our Bugs, Our Responsibility. == The Samba Team ========================================================== .
For details on migrating Samba/CTDB configuration files, refer to:
https://access.redhat.com/solutions/4311261
- This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. ========================================================================== Ubuntu Security Notice USN-5260-1 February 01, 2022
samba vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Samba.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled certain memory operations. (CVE-2021-44142)
Michael Hanselmann discovered that Samba incorrectly created directories. In certain configurations, a remote attacker could possibly create a directory on the server outside of the shared directory. (CVE-2021-43566)
Kees van Vloten discovered that Samba incorrectly handled certain aliased SPN checks. A remote attacker could possibly use this issue to impersonate services. (CVE-2022-0336)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10: samba 2:4.13.17~dfsg-0ubuntu0.21.10.1
Ubuntu 20.04 LTS: samba 2:4.13.17~dfsg-0ubuntu0.21.04.1
This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Critical: samba security and bug fix update Advisory ID: RHSA-2022:0331-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0331 Issue date: 2022-01-31 CVE Names: CVE-2021-44142 ==================================================================== 1. Summary:
An update for samba is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
- samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Fix username map script regression introduced with CVE-2020-25717 (BZ#2046173)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted automatically.
- Package List:
Red Hat Enterprise Linux BaseOS EUS (v.8.4):
Source: samba-4.13.3-9.el8_4.src.rpm
aarch64: ctdb-4.13.3-9.el8_4.aarch64.rpm ctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-4.13.3-9.el8_4.aarch64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libwbclient-4.13.3-9.el8_4.aarch64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm python3-samba-4.13.3-9.el8_4.aarch64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm python3-samba-test-4.13.3-9.el8_4.aarch64.rpm samba-4.13.3-9.el8_4.aarch64.rpm samba-client-4.13.3-9.el8_4.aarch64.rpm samba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debugsource-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-libs-4.13.3-9.el8_4.aarch64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-4.13.3-9.el8_4.aarch64.rpm samba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm
noarch: samba-common-4.13.3-9.el8_4.noarch.rpm samba-pidl-4.13.3-9.el8_4.noarch.rpm
ppc64le: ctdb-4.13.3-9.el8_4.ppc64le.rpm ctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libwbclient-4.13.3-9.el8_4.ppc64le.rpm libwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm python3-samba-4.13.3-9.el8_4.ppc64le.rpm python3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm python3-samba-test-4.13.3-9.el8_4.ppc64le.rpm samba-4.13.3-9.el8_4.ppc64le.rpm samba-client-4.13.3-9.el8_4.ppc64le.rpm samba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debugsource-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-libs-4.13.3-9.el8_4.ppc64le.rpm samba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-4.13.3-9.el8_4.ppc64le.rpm samba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm
s390x: ctdb-4.13.3-9.el8_4.s390x.rpm ctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm ctdb-tests-4.13.3-9.el8_4.s390x.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-4.13.3-9.el8_4.s390x.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libwbclient-4.13.3-9.el8_4.s390x.rpm libwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm python3-samba-4.13.3-9.el8_4.s390x.rpm python3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm python3-samba-test-4.13.3-9.el8_4.s390x.rpm samba-4.13.3-9.el8_4.s390x.rpm samba-client-4.13.3-9.el8_4.s390x.rpm samba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-libs-4.13.3-9.el8_4.s390x.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-libs-4.13.3-9.el8_4.s390x.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-tools-4.13.3-9.el8_4.s390x.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debugsource-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-libs-4.13.3-9.el8_4.s390x.rpm samba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-4.13.3-9.el8_4.s390x.rpm samba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-libs-4.13.3-9.el8_4.s390x.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm
x86_64: ctdb-4.13.3-9.el8_4.x86_64.rpm ctdb-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-4.13.3-9.el8_4.i686.rpm libsmbclient-4.13.3-9.el8_4.x86_64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libwbclient-4.13.3-9.el8_4.i686.rpm libwbclient-4.13.3-9.el8_4.x86_64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm python3-samba-4.13.3-9.el8_4.i686.rpm python3-samba-4.13.3-9.el8_4.x86_64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm python3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm python3-samba-test-4.13.3-9.el8_4.x86_64.rpm samba-4.13.3-9.el8_4.x86_64.rpm samba-client-4.13.3-9.el8_4.x86_64.rpm samba-client-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-4.13.3-9.el8_4.i686.rpm samba-client-libs-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debuginfo-4.13.3-9.el8_4.i686.rpm samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debugsource-4.13.3-9.el8_4.i686.rpm samba-debugsource-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-libs-4.13.3-9.el8_4.i686.rpm samba-libs-4.13.3-9.el8_4.x86_64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-4.13.3-9.el8_4.x86_64.rpm samba-test-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winexe-4.13.3-9.el8_4.x86_64.rpm samba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.4):
aarch64: ctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libsmbclient-devel-4.13.3-9.el8_4.aarch64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm libwbclient-devel-4.13.3-9.el8_4.aarch64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-debugsource-4.13.3-9.el8_4.aarch64.rpm samba-devel-4.13.3-9.el8_4.aarch64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm
ppc64le: ctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libsmbclient-devel-4.13.3-9.el8_4.ppc64le.rpm libwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm libwbclient-devel-4.13.3-9.el8_4.ppc64le.rpm python3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-debugsource-4.13.3-9.el8_4.ppc64le.rpm samba-devel-4.13.3-9.el8_4.ppc64le.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm
s390x: ctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libsmbclient-devel-4.13.3-9.el8_4.s390x.rpm libwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm libwbclient-devel-4.13.3-9.el8_4.s390x.rpm python3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-debugsource-4.13.3-9.el8_4.s390x.rpm samba-devel-4.13.3-9.el8_4.s390x.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm
x86_64: ctdb-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm ctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libsmbclient-devel-4.13.3-9.el8_4.i686.rpm libsmbclient-devel-4.13.3-9.el8_4.x86_64.rpm libwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm libwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm libwbclient-devel-4.13.3-9.el8_4.i686.rpm libwbclient-devel-4.13.3-9.el8_4.x86_64.rpm python3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm python3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm samba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debuginfo-4.13.3-9.el8_4.i686.rpm samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-debugsource-4.13.3-9.el8_4.i686.rpm samba-debugsource-4.13.3-9.el8_4.x86_64.rpm samba-devel-4.13.3-9.el8_4.i686.rpm samba-devel-4.13.3-9.el8_4.x86_64.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm samba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm samba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm samba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm samba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-44142 https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYfg3odzjgjWX9erEAQimyg/+NRtV8CgeDBg2ekQ0/JSEE2zUM2tOUbls W+8ZipOxqyu22gfT+gutgPbFOmeqDIPcIz7GxV+6UU8p6Tyet/JxHTfYabAaUzFs 7k/xPFkxrq//ckbz3aJGmrSRQRwvMAmYKuUQ+0Bci3uc+EN4e9hD71hzrfNeWuOZ +5bM6mjoXeWn/QN9pxP09VG+aHbEFd0X8pXpjv4ttYTYvRfmdwKsr2xsRqFT4LmC 0MOb7IKjyi35BdhbiKNMehUFnY1HAhIIrAATelYbgQSgFAb5yB9KgBiKleWtmn5e 5WUjn4Mg0b0nIqEBIfmCm+ogLx2VgK952cUupCOR3OAe+EIpFLBlZQ0JHgzhBTIH Pb6DU2KuQeFjleHKjue2gl6hKQkO63zsNL74C8yXo1qGIXZPP5s7ZdeceeGHEUE3 aK0F9YZyb6X59I5tITGkXcR52X/B5KEy/5c1bFj/fmG6mjOYIhzl6uNcPYfTUVnC iED392+3QCd1cP4SHME+KG2gm9ynK08QKkoCbkLunoBC/Nohne/qxIgTJF2SBIO5 IQ+JVGdhOv8l0MlJXL29rFuX726+zUlDFjkz+2a+HbUdQy0ZhNcAsWacBqWFIrDZ mDBLLGeog1t43BldL8/i5BMbtoqzNGn/jpSf5VOudBTyXjnWhRW5DyKIA3KXpeRq 0OyQIwaeKPA=hemV -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .
CVE-2022-0336
Kees van Vloten reported that Samba AD users with permission to
write to an account can impersonate arbitrary services.
For the oldstable distribution (buster), these problems have been fixed in version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has not been addressed for the oldstable distribution (buster).
For the stable distribution (bullseye), these problems have been fixed in version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes for CVE-2020-25717 are included in this update (Cf.
For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIGeeJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SBDg//TfBB+gXbb751f6ltULdhmZUtEVL1Kyns8/LpEkKKKNU8AS8FOsLQs/o8 ICNJ3Fqv9XYqZ0Kc8w4w800jq6svy4nXkwRIiOzN0WqKXxNDZMzqDs0ACVyNQgE8 Pfugf+M5FAawPl5WhBtY+g+uUiwwjz7+UZ1eYcxLf1PT6lQLZ043WLT4mwUcB5vI 1vbmDwlLQXxkLHwvL8bmjiM0wt3E4w+6IdspEfC0wsR4biyoG2vkUWuPGuuNnsNO 8gDyuNaSRUCNEEDiMR8WBwwd9WTvvlrlmHvOS1mBQy2SX/2270apRWN0WSYJ16ee qgtWpB7aPNJGMS2z6lE7VgZ0l2mlvqoTm7SkXH3RjZTisXQjqKZ7LojckDghdWz2 XaWLQMFb7S2ezaDoUE8NcXWXxyzC0LrFVoiOsK69bXT7IoBtamWO/ZjChdEo+9rd X906cyro9CMtPIcb5Czc5Rj0EstbDplVr9Xma42KTJcYVCp5GQ/aJ0ZKtoFctITp ZbWACwfu5xj6XbpkAYnQDkMsjhrrlsTX804oODcUPhDdV/L+rI17Yz2ofqMpk8Pl Xpuk/YWVjheB1fLpAGh1e5OtXBbBodrlSoLWwz9pvwkZYzUQHBUcbWD9IXlbKG92 2mmOQDnboWcGLiKxMjch4B7nVmspOn5FFwZN0PP0/mMdFZpNqyU= =UWmB -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202309-06
https://security.gentoo.org/
Severity: High Title: Samba: Multiple Vulnerabilities Date: September 17, 2023 Bugs: #820566, #821688, #830983, #832433, #861512, #866225, #869122, #878273, #880437, #886153, #903621, #905320, #910334 ID: 202309-06
Synopsis
Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
Background
Samba is a suite of SMB and CIFS client/server programs.
Affected packages
Package Vulnerable Unaffected
net-fs/samba < 4.18.4 >= 4.18.4
Description
Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Samba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.18.4"
References
[ 1 ] CVE-2007-4559 https://nvd.nist.gov/vuln/detail/CVE-2007-4559 [ 2 ] CVE-2016-2124 https://nvd.nist.gov/vuln/detail/CVE-2016-2124 [ 3 ] CVE-2020-17049 https://nvd.nist.gov/vuln/detail/CVE-2020-17049 [ 4 ] CVE-2020-25717 https://nvd.nist.gov/vuln/detail/CVE-2020-25717 [ 5 ] CVE-2020-25718 https://nvd.nist.gov/vuln/detail/CVE-2020-25718 [ 6 ] CVE-2020-25719 https://nvd.nist.gov/vuln/detail/CVE-2020-25719 [ 7 ] CVE-2020-25721 https://nvd.nist.gov/vuln/detail/CVE-2020-25721 [ 8 ] CVE-2020-25722 https://nvd.nist.gov/vuln/detail/CVE-2020-25722 [ 9 ] CVE-2021-3670 https://nvd.nist.gov/vuln/detail/CVE-2021-3670 [ 10 ] CVE-2021-3738 https://nvd.nist.gov/vuln/detail/CVE-2021-3738 [ 11 ] CVE-2021-20251 https://nvd.nist.gov/vuln/detail/CVE-2021-20251 [ 12 ] CVE-2021-20316 https://nvd.nist.gov/vuln/detail/CVE-2021-20316 [ 13 ] CVE-2021-23192 https://nvd.nist.gov/vuln/detail/CVE-2021-23192 [ 14 ] CVE-2021-44141 https://nvd.nist.gov/vuln/detail/CVE-2021-44141 [ 15 ] CVE-2021-44142 https://nvd.nist.gov/vuln/detail/CVE-2021-44142 [ 16 ] CVE-2022-0336 https://nvd.nist.gov/vuln/detail/CVE-2022-0336 [ 17 ] CVE-2022-1615 https://nvd.nist.gov/vuln/detail/CVE-2022-1615 [ 18 ] CVE-2022-2031 https://nvd.nist.gov/vuln/detail/CVE-2022-2031 [ 19 ] CVE-2022-3437 https://nvd.nist.gov/vuln/detail/CVE-2022-3437 [ 20 ] CVE-2022-3592 https://nvd.nist.gov/vuln/detail/CVE-2022-3592 [ 21 ] CVE-2022-32742 https://nvd.nist.gov/vuln/detail/CVE-2022-32742 [ 22 ] CVE-2022-32743 https://nvd.nist.gov/vuln/detail/CVE-2022-32743 [ 23 ] CVE-2022-32744 https://nvd.nist.gov/vuln/detail/CVE-2022-32744 [ 24 ] CVE-2022-32745 https://nvd.nist.gov/vuln/detail/CVE-2022-32745 [ 25 ] CVE-2022-32746 https://nvd.nist.gov/vuln/detail/CVE-2022-32746 [ 26 ] CVE-2022-37966 https://nvd.nist.gov/vuln/detail/CVE-2022-37966 [ 27 ] CVE-2022-37967 https://nvd.nist.gov/vuln/detail/CVE-2022-37967 [ 28 ] CVE-2022-38023 https://nvd.nist.gov/vuln/detail/CVE-2022-38023 [ 29 ] CVE-2022-42898 https://nvd.nist.gov/vuln/detail/CVE-2022-42898 [ 30 ] CVE-2022-45141 https://nvd.nist.gov/vuln/detail/CVE-2022-45141 [ 31 ] CVE-2023-0225 https://nvd.nist.gov/vuln/detail/CVE-2023-0225 [ 32 ] CVE-2023-0614 https://nvd.nist.gov/vuln/detail/CVE-2023-0614 [ 33 ] CVE-2023-0922 https://nvd.nist.gov/vuln/detail/CVE-2023-0922
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202309-06
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "samba", "scope": null, "trust": 2.1, "vendor": "samba", "version": null }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.15.0" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "11.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "21.10" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "20.04" }, { "model": "virtualization host", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "enterprise linux for power little endian eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux for ibm z systems eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "diskstation manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "6.2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.14.0" }, { "model": "gluster storage", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.5" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "35" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.15.5" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.1" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "34" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "diskstation manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2.4-25556.4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.13.17" }, { "model": "enterprise linux for power little endian eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "enterprise linux for ibm z systems eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.14.12" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "enterprise linux resilient storage", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "codeready linux builder", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.15.5", "versionStartIncluding": "4.15.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.12", "versionStartIncluding": "4.14.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.13.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2.4-25556.4", "versionStartIncluding": "6.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-44142" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nguyen Hoang Thach (https://twitter.com/hi_im_d4rkn3ss) and Billy Jheng Bing-Jhong (https://twitter.com/st424204)", "sources": [ { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" } ], "trust": 2.0 }, "cve": "CVE-2021-44142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-406753", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-44142", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-44142", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2021-44142", "trust": 1.4, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-44142", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2021-44142", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-2719", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-406753", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "VULHUB", "id": "VHN-406753" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of AppleDouble entries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. \n\nThe specific flaw exists within the parsing of EA metadata when\nopening files in smbd. \n\nThe problem in vfs_fruit exists in the default configuration of the\nfruit VFS module using fruit:metadata=netatalk or fruit:resource=file. \nIf both options are set to different settings than the default values,\nthe system is not affected by the security issue. \n\n==================\nPatch Availability\n==================\n\nPatches addressing both these issues have been posted to:\n\n https://www.samba.org/samba/security/\n\nAdditionally, Samba 4.13.17, 4.14.12 and 4.15.5 have been issued as\nsecurity releases to correct the defect. \n\n==================\nCVSSv3 calculation\n==================\n\nCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C\n\nBase score 9.9. \n\n==========\nWorkaround\n==========\n\nAs a workaround remove the \"fruit\" VFS module from the list of\nconfigured VFS objects in any \"vfs objects\" line in the Samba\nconfiguration smb.conf. \n\nNote that changing the VFS module settings fruit:metadata or\nfruit:resource to use the unaffected setting causes all stored\ninformation to be inaccessible and will make it appear to macOS\nclients as if the information is lost. \n\n\n=======\nCredits\n=======\n\nOriginally reported by Orange Tsai from DEVCORE. \n\nPatches provided by Ralph B\u00f6hme of the Samba team. \n\n==========================================================\n== Our Code, Our Bugs, Our Responsibility. \n== The Samba Team\n==========================================================\n. \n\nFor details on migrating Samba/CTDB configuration files, refer to: \n\nhttps://access.redhat.com/solutions/4311261\n\n5. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. ==========================================================================\nUbuntu Security Notice USN-5260-1\nFebruary 01, 2022\n\nsamba vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.10\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Samba. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nOrange Tsai discovered that the Samba vfs_fruit module incorrectly handled\ncertain memory operations. (CVE-2021-44142)\n\nMichael Hanselmann discovered that Samba incorrectly created directories. \nIn certain configurations, a remote attacker could possibly create a\ndirectory on the server outside of the shared directory. (CVE-2021-43566)\n\nKees van Vloten discovered that Samba incorrectly handled certain aliased\nSPN checks. A remote attacker could possibly use this issue to impersonate\nservices. (CVE-2022-0336)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.10:\n samba 2:4.13.17~dfsg-0ubuntu0.21.10.1\n\nUbuntu 20.04 LTS:\n samba 2:4.13.17~dfsg-0ubuntu0.21.04.1\n\nThis update uses a new upstream release, which includes additional bug\nfixes. In general, a standard system update will make all the necessary\nchanges. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Critical: samba security and bug fix update\nAdvisory ID: RHSA-2022:0331-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:0331\nIssue date: 2022-01-31\nCVE Names: CVE-2021-44142\n====================================================================\n1. Summary:\n\nAn update for samba is now available for Red Hat Enterprise Linux 8.4\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB)\nprotocol and the related Common Internet File System (CIFS) protocol, which\nallow PC-compatible machines to share files, printers, and various\ninformation. \n\nSecurity Fix(es):\n\n* samba: Out-of-bounds heap read/write vulnerability in VFS module\nvfs_fruit allows code execution (CVE-2021-44142)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Fix username map script regression introduced with CVE-2020-25717\n(BZ#2046173)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the smb service will be restarted\nautomatically. \n\n5. Package List:\n\nRed Hat Enterprise Linux BaseOS EUS (v.8.4):\n\nSource:\nsamba-4.13.3-9.el8_4.src.rpm\n\naarch64:\nctdb-4.13.3-9.el8_4.aarch64.rpm\nctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-test-4.13.3-9.el8_4.aarch64.rpm\nsamba-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debugsource-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm\n\nnoarch:\nsamba-common-4.13.3-9.el8_4.noarch.rpm\nsamba-pidl-4.13.3-9.el8_4.noarch.rpm\n\nppc64le:\nctdb-4.13.3-9.el8_4.ppc64le.rpm\nctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-test-4.13.3-9.el8_4.ppc64le.rpm\nsamba-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debugsource-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\n\ns390x:\nctdb-4.13.3-9.el8_4.s390x.rpm\nctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\npython3-samba-4.13.3-9.el8_4.s390x.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm\npython3-samba-test-4.13.3-9.el8_4.s390x.rpm\nsamba-4.13.3-9.el8_4.s390x.rpm\nsamba-client-4.13.3-9.el8_4.s390x.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debugsource-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-4.13.3-9.el8_4.s390x.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm\n\nx86_64:\nctdb-4.13.3-9.el8_4.x86_64.rpm\nctdb-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-4.13.3-9.el8_4.i686.rpm\nlibwbclient-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-4.13.3-9.el8_4.i686.rpm\npython3-samba-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-test-4.13.3-9.el8_4.x86_64.rpm\nsamba-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debugsource-4.13.3-9.el8_4.i686.rpm\nsamba-debugsource-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-4.13.3-9.el8_4.i686.rpm\nsamba-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm\n\nRed Hat CodeReady Linux Builder EUS (v. 8.4):\n\naarch64:\nctdb-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nlibwbclient-devel-4.13.3-9.el8_4.aarch64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-debugsource-4.13.3-9.el8_4.aarch64.rpm\nsamba-devel-4.13.3-9.el8_4.aarch64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.aarch64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.aarch64.rpm\n\nppc64le:\nctdb-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nlibwbclient-devel-4.13.3-9.el8_4.ppc64le.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-debugsource-4.13.3-9.el8_4.ppc64le.rpm\nsamba-devel-4.13.3-9.el8_4.ppc64le.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.ppc64le.rpm\n\ns390x:\nctdb-debuginfo-4.13.3-9.el8_4.s390x.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.s390x.rpm\nlibwbclient-devel-4.13.3-9.el8_4.s390x.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-debugsource-4.13.3-9.el8_4.s390x.rpm\nsamba-devel-4.13.3-9.el8_4.s390x.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.s390x.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.s390x.rpm\n\nx86_64:\nctdb-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.i686.rpm\nctdb-tests-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.i686.rpm\nlibsmbclient-devel-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.i686.rpm\nlibwbclient-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nlibwbclient-devel-4.13.3-9.el8_4.i686.rpm\nlibwbclient-devel-4.13.3-9.el8_4.x86_64.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.i686.rpm\npython3-samba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-client-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-common-tools-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-debugsource-4.13.3-9.el8_4.i686.rpm\nsamba-debugsource-4.13.3-9.el8_4.x86_64.rpm\nsamba-devel-4.13.3-9.el8_4.i686.rpm\nsamba-devel-4.13.3-9.el8_4.x86_64.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-krb5-printing-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-test-libs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-vfs-glusterfs-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-clients-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-krb5-locator-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.i686.rpm\nsamba-winbind-modules-debuginfo-4.13.3-9.el8_4.x86_64.rpm\nsamba-winexe-debuginfo-4.13.3-9.el8_4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-44142\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n0OyQIwaeKPA=hemV\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nCVE-2022-0336\n\n Kees van Vloten reported that Samba AD users with permission to\n write to an account can impersonate arbitrary services. \n\nFor the oldstable distribution (buster), these problems have been fixed\nin version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has\nnot been addressed for the oldstable distribution (buster). \n\nFor the stable distribution (bullseye), these problems have been fixed\nin version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes\nfor CVE-2020-25717 are included in this update (Cf. \n\nFor the detailed security status of samba please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/samba\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n2mmOQDnboWcGLiKxMjch4B7nVmspOn5FFwZN0PP0/mMdFZpNqyU=\n=UWmB\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202309-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Samba: Multiple Vulnerabilities\n Date: September 17, 2023\n Bugs: #820566, #821688, #830983, #832433, #861512, #866225, #869122, #878273, #880437, #886153, #903621, #905320, #910334\n ID: 202309-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in Samba, the worst of\nwhich could result in root remote code execution. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\nPackage Vulnerable Unaffected\n------------ ------------ ------------\nnet-fs/samba \u003c 4.18.4 \u003e= 4.18.4\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.18.4\"\n\nReferences\n==========\n\n[ 1 ] CVE-2007-4559\n https://nvd.nist.gov/vuln/detail/CVE-2007-4559\n[ 2 ] CVE-2016-2124\n https://nvd.nist.gov/vuln/detail/CVE-2016-2124\n[ 3 ] CVE-2020-17049\n https://nvd.nist.gov/vuln/detail/CVE-2020-17049\n[ 4 ] CVE-2020-25717\n https://nvd.nist.gov/vuln/detail/CVE-2020-25717\n[ 5 ] CVE-2020-25718\n https://nvd.nist.gov/vuln/detail/CVE-2020-25718\n[ 6 ] CVE-2020-25719\n https://nvd.nist.gov/vuln/detail/CVE-2020-25719\n[ 7 ] CVE-2020-25721\n https://nvd.nist.gov/vuln/detail/CVE-2020-25721\n[ 8 ] CVE-2020-25722\n https://nvd.nist.gov/vuln/detail/CVE-2020-25722\n[ 9 ] CVE-2021-3670\n https://nvd.nist.gov/vuln/detail/CVE-2021-3670\n[ 10 ] CVE-2021-3738\n https://nvd.nist.gov/vuln/detail/CVE-2021-3738\n[ 11 ] CVE-2021-20251\n https://nvd.nist.gov/vuln/detail/CVE-2021-20251\n[ 12 ] CVE-2021-20316\n https://nvd.nist.gov/vuln/detail/CVE-2021-20316\n[ 13 ] CVE-2021-23192\n https://nvd.nist.gov/vuln/detail/CVE-2021-23192\n[ 14 ] CVE-2021-44141\n https://nvd.nist.gov/vuln/detail/CVE-2021-44141\n[ 15 ] CVE-2021-44142\n https://nvd.nist.gov/vuln/detail/CVE-2021-44142\n[ 16 ] CVE-2022-0336\n https://nvd.nist.gov/vuln/detail/CVE-2022-0336\n[ 17 ] CVE-2022-1615\n https://nvd.nist.gov/vuln/detail/CVE-2022-1615\n[ 18 ] CVE-2022-2031\n https://nvd.nist.gov/vuln/detail/CVE-2022-2031\n[ 19 ] CVE-2022-3437\n https://nvd.nist.gov/vuln/detail/CVE-2022-3437\n[ 20 ] CVE-2022-3592\n https://nvd.nist.gov/vuln/detail/CVE-2022-3592\n[ 21 ] CVE-2022-32742\n https://nvd.nist.gov/vuln/detail/CVE-2022-32742\n[ 22 ] CVE-2022-32743\n https://nvd.nist.gov/vuln/detail/CVE-2022-32743\n[ 23 ] CVE-2022-32744\n https://nvd.nist.gov/vuln/detail/CVE-2022-32744\n[ 24 ] CVE-2022-32745\n https://nvd.nist.gov/vuln/detail/CVE-2022-32745\n[ 25 ] CVE-2022-32746\n https://nvd.nist.gov/vuln/detail/CVE-2022-32746\n[ 26 ] CVE-2022-37966\n https://nvd.nist.gov/vuln/detail/CVE-2022-37966\n[ 27 ] CVE-2022-37967\n https://nvd.nist.gov/vuln/detail/CVE-2022-37967\n[ 28 ] CVE-2022-38023\n https://nvd.nist.gov/vuln/detail/CVE-2022-38023\n[ 29 ] CVE-2022-42898\n https://nvd.nist.gov/vuln/detail/CVE-2022-42898\n[ 30 ] CVE-2022-45141\n https://nvd.nist.gov/vuln/detail/CVE-2022-45141\n[ 31 ] CVE-2023-0225\n https://nvd.nist.gov/vuln/detail/CVE-2023-0225\n[ 32 ] CVE-2023-0614\n https://nvd.nist.gov/vuln/detail/CVE-2023-0614\n[ 33 ] CVE-2023-0922\n https://nvd.nist.gov/vuln/detail/CVE-2023-0922\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202309-06\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2021-44142" }, { "db": "CERT/CC", "id": "VU#119678" }, { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "VULHUB", "id": "VHN-406753" }, { "db": "PACKETSTORM", "id": "165801" }, { "db": "PACKETSTORM", "id": "165905" }, { "db": "PACKETSTORM", "id": "165842" }, { "db": "PACKETSTORM", "id": "165797" }, { "db": "PACKETSTORM", "id": "165796" }, { "db": "PACKETSTORM", "id": "165793" }, { "db": "PACKETSTORM", "id": "169234" }, { "db": "PACKETSTORM", "id": "174695" } ], "trust": 4.32 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-406753", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-406753" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-44142", "trust": 5.5 }, { "db": "CERT/CC", "id": "VU#119678", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-246", "trust": 1.3 }, { "db": "PACKETSTORM", "id": "165842", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15846", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15833", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-245", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-16156", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-244", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "166137", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "165906", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169234", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022032506", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022021713", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022041954", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022021902", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022021417", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051734", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022020807", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022022408", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0489", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0795", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0600", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0619", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-2719", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "165793", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "165791", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "165796", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "165797", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "165905", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "165801", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "166138", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "165789", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "165788", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "165790", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-406753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "174695", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#119678" }, { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "VULHUB", "id": "VHN-406753" }, { "db": "PACKETSTORM", "id": "165801" }, { "db": "PACKETSTORM", "id": "165905" }, { "db": "PACKETSTORM", "id": "165842" }, { "db": "PACKETSTORM", "id": "165797" }, { "db": "PACKETSTORM", "id": "165796" }, { "db": "PACKETSTORM", "id": "165793" }, { "db": "PACKETSTORM", "id": "165791" }, { "db": "PACKETSTORM", "id": "169234" }, { "db": "PACKETSTORM", "id": "174695" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "id": "VAR-202201-0295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-406753" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:12:56.487000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Samba has issued an update to correct this vulnerability.", "trust": 2.1, "url": "https://www.samba.org/samba/security/cve-2021-44142.html" }, { "title": "Samba Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=184448" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-406753" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://www.samba.org/samba/security/cve-2021-44142.html" }, { "trust": 1.7, "url": "https://kb.cert.org/vuls/id/119678" }, { "trust": 1.7, "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/202309-06" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-44142" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2021-44142" }, { "trust": 0.8, "url": "cve-2021-44142 " }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051734" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0795" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/samba-buffer-overflow-via-vfs-module-vfs-fruit-37416" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-246/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022032506" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169234/debian-security-advisory-5071-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022021713" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022021417" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022041954" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/165842/ubuntu-security-notice-usn-5260-3.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/165906/red-hat-security-advisory-2022-0457-03.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022020807" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0619" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022021902" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-44142/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022022408" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0600" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/166137/red-hat-security-advisory-2022-0664-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0489" }, { "trust": 0.3, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://ubuntu.com/security/notices/usn-5260-1" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0336" }, { "trust": 0.1, "url": "https://www.samba.org/samba/security/" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/4311261" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:0458" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5260-3" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43566" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.28" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5260-2" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:0331" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:0330" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/samba" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25719" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37966" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3592" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25717" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1615" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25722" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32742" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25718" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-44141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42898" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3738" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32746" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32744" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37967" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20316" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32743" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17049" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38023" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3437" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20251" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32745" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25721" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2124" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-45141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-0225" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23192" } ], "sources": [ { "db": "CERT/CC", "id": "VU#119678" }, { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "VULHUB", "id": "VHN-406753" }, { "db": "PACKETSTORM", "id": "165801" }, { "db": "PACKETSTORM", "id": "165905" }, { "db": "PACKETSTORM", "id": "165842" }, { "db": "PACKETSTORM", "id": "165797" }, { "db": "PACKETSTORM", "id": "165796" }, { "db": "PACKETSTORM", "id": "165793" }, { "db": "PACKETSTORM", "id": "165791" }, { "db": "PACKETSTORM", "id": "169234" }, { "db": "PACKETSTORM", "id": "174695" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#119678" }, { "db": "ZDI", "id": "ZDI-22-246" }, { "db": "ZDI", "id": "ZDI-22-245" }, { "db": "ZDI", "id": "ZDI-22-244" }, { "db": "VULHUB", "id": "VHN-406753" }, { "db": "PACKETSTORM", "id": "165801" }, { "db": "PACKETSTORM", "id": "165905" }, { "db": "PACKETSTORM", "id": "165842" }, { "db": "PACKETSTORM", "id": "165797" }, { "db": "PACKETSTORM", "id": "165796" }, { "db": "PACKETSTORM", "id": "165793" }, { "db": "PACKETSTORM", "id": "165791" }, { "db": "PACKETSTORM", "id": "169234" }, { "db": "PACKETSTORM", "id": "174695" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "db": "NVD", "id": "CVE-2021-44142" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-31T00:00:00", "db": "CERT/CC", "id": "VU#119678" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-246" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-245" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-244" }, { "date": "2022-02-21T00:00:00", "db": "VULHUB", "id": "VHN-406753" }, { "date": "2022-02-02T16:21:28", "db": "PACKETSTORM", "id": "165801" }, { "date": "2022-02-09T16:03:23", "db": "PACKETSTORM", "id": "165905" }, { "date": "2022-02-03T16:31:23", "db": "PACKETSTORM", "id": "165842" }, { "date": "2022-02-01T17:04:22", "db": "PACKETSTORM", "id": "165797" }, { "date": "2022-02-01T17:04:16", "db": "PACKETSTORM", "id": "165796" }, { "date": "2022-02-01T17:02:58", "db": "PACKETSTORM", "id": "165793" }, { "date": "2022-02-01T17:02:44", "db": "PACKETSTORM", "id": "165791" }, { "date": "2022-02-28T20:12:00", "db": "PACKETSTORM", "id": "169234" }, { "date": "2023-09-18T13:42:53", "db": "PACKETSTORM", "id": "174695" }, { "date": "2022-01-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "date": "2022-02-21T15:15:07.380000", "db": "NVD", "id": "CVE-2021-44142" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "CERT/CC", "id": "VU#119678" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-246" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-245" }, { "date": "2022-02-01T00:00:00", "db": "ZDI", "id": "ZDI-22-244" }, { "date": "2022-02-23T00:00:00", "db": "VULHUB", "id": "VHN-406753" }, { "date": "2022-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2719" }, { "date": "2023-11-07T03:39:33.470000", "db": "NVD", "id": "CVE-2021-44142" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "165801" }, { "db": "PACKETSTORM", "id": "165842" }, { "db": "PACKETSTORM", "id": "165797" }, { "db": "PACKETSTORM", "id": "165796" }, { "db": "PACKETSTORM", "id": "174695" }, { "db": "CNNVD", "id": "CNNVD-202201-2719" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba vfs_fruit module insecurely handles extended file attributes", "sources": [ { "db": "CERT/CC", "id": "VU#119678" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2719" } ], "trust": 0.6 } }
var-201707-0592
Vulnerability from variot
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated. Heimdal is prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to bypass certain security restrictions and perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. Heimdal is a Kerberos 5 implementation. A data forgery issue vulnerability exists in Heimdal versions prior to 7.4. =========================================================================== Ubuntu Security Notice USN-3353-3 July 24, 2017
heimdal vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
Ubuntu 12.04 LTS
Summary
Heimdal could allow unintended access to network services. Software description
heimdal - Heimdal Kerberos Network Authentication Protocol
Details
USN-3353-1 fixed a vulnerability in Heimdal. This update provides the corresponding updade for Ubuntu 12.04 ESM.
Original advisory details:
Jeffrey Altman, Viktor Dukhovni, and Nicolas Williams discovered that Heimdal clients incorrectly trusted unauthenticated portions of Kerberos tickets. A remote attacker could use this to impersonate trusted network services or perform other attacks.
Update instructions
The problem can be corrected by updating your system to the following package version:
Ubuntu 12.04 LTS: libkrb5-26-heimdal 1.6~git20120311.dfsg.1-2ubuntu0.2
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart any applications using Heimdal libraries to make all the necessary changes.
References
https://www.ubuntu.com/usn/usn-3353-3 https://www.ubuntu.com/usn/usn-3353-1 CVE-2017-11103 . CVE-2017-7074: Daniel Jalkut of Red Sweater Software
Captive Network Assistant Available for: OS X Lion v10.8 and later Impact: A local user may unknowingly send a password unencrypted over the network Description: The security state of the captive portal browser was not obvious. CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843 Entry added September 25, 2017
Additional recognition
Security We would like to acknowledge Abhinav Bansal of Zscaler, Inc. for their assistance.
Webkit We would like to acknowledge xisigr of Tencent's Xuanwu Lab (tencent.com) for their assistance. CVE-2016-736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789
APFS Available for: macOS High Sierra 10.13 Impact: A malicious Thunderbolt adapter may be able to recover unencrypted APFS filesystem data Description: An issue existed in the handling of DMA. This issue was addressed by limiting the time the FileVault decryption buffers are DMA mapped to the duration of the I/O operation. CVE-2017-1000101: Brian Carpenter, Yongji Ouyang
Dictionary Widget Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Searching pasted text in the Dictionary widget may lead to compromise of user information Description: A validation issue existed which allowed local file access. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. CVE-2017-11108 CVE-2017-11541 CVE-2017-11542 CVE-2017-11543 CVE-2017-12893 CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-12897 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-12901 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-12987 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-12991 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-12995 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-12999 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-13003 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-13007 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-13011 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-13015 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-13019 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-13023 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-13027 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-13031 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-13035 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-13039 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-13043 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-13047 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-13051 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-13055 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-13690 CVE-2017-13725
Wi-Fi Available for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-10-31-9 Additional information for APPLE-SA-2017-09-19-1 iOS 11
iOS 11 addresses the following:
802.1X Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker may be able to exploit weaknesses in TLS 1.0 Description: A protocol security issue was addressed by enabling TLS 1.1 and TLS 1.2. CVE-2017-13832: an anonymous researcher Entry added October 31, 2017
Bluetooth Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to access restricted files Description: A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. CVE-2017-7131: Dominik Conrads of Federal Office for Information Security, an anonymous researcher, Elvis (@elvisimprsntr), an anonymous researcher
CFNetwork Proxies Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged network position may be able to cause a denial of service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-2017-7083: Abhinav Bansal of Zscaler Inc.
CFString Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13821: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
CoreAudio Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed by updating to Opus version 1.1.4. CVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend Micro
CoreText Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13825: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
Exchange ActiveSync Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged network position may be able to erase a device during Exchange account setup Description: A validation issue existed in AutoDiscover V1. This was addressed by requiring TLS for AutoDiscover V1. AutoDiscover V2 is now supported. CVE-2017-7088: Ilya Nesterov, Maxim Goncharov
file Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.31. CVE-2017-13815 Entry added October 31, 2017
Fonts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Rendering untrusted text may lead to spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13828: an anonymous researcher Entry added October 31, 2017
Heimdal Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged network position may be able to impersonate a service Description: A validation issue existed in the handling of the KDC-REP service name. This issue was addressed through improved validation. CVE-2017-11103: Jeffrey Altman, Viktor Duchovni, and Nico Williams
HFS Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum Entry added October 31, 2017
iBooks Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Parsing a maliciously crafted iBooks file may lead to a persistent denial-of-service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-2017-7072: JAdrzej Krysztofiak
ImageIO Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-13814: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
ImageIO Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted image may lead to a denial of service Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-2017-13831: an anonymous researcher Entry added October 31, 2017
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7114: Alex Plaskett of MWR InfoSecurity
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13817: Maxime Villard (m00nbsd) Entry added October 31, 2017
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13818: The UK's National Cyber Security Centre (NCSC) CVE-2017-13836: an anonymous researcher, an anonymous researcher CVE-2017-13841: an anonymous researcher CVE-2017-13840: an anonymous researcher CVE-2017-13842: an anonymous researcher CVE-2017-13782: Kevin Backhouse of Semmle Ltd. Entry added October 31, 2017
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13843: an anonymous researcher Entry added October 31, 2017
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a malformed mach binary may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved validation. CVE-2017-13834: Maxime Villard (m00nbsd) Entry added October 31, 2017
Keyboard Suggestions Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Keyboard autocorrect suggestions may reveal sensitive information Description: The iOS keyboard was inadvertently caching sensitive information. This issue was addressed with improved heuristics. CVE-2017-7140: an anonymous researcher
libarchive Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-13813: found by OSS-Fuzz CVE-2017-13816: found by OSS-Fuzz Entry added October 31, 2017
libarchive Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: Multiple memory corruption issues existed in libarchive. These issues were addressed through improved input validation. CVE-2017-13812: found by OSS-Fuzz Entry added October 31, 2017
libc Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to cause a denial-of-service Description: A resource exhaustion issue in glob() was addressed through an improved algorithm. CVE-2017-7086: Russ Cox of Google
libc Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to cause a denial of service Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-1000373
libexpat Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Multiple issues in expat Description: Multiple issues were addressed by updating to version 2.2.1 CVE-2016-9063 CVE-2017-9233
Location Framework Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read sensitive location information Description: A permissions issue existed in the handling of the location variable. This was addressed with additional ownership checks. CVE-2017-7148: an anonymous researcher, an anonymous researcher
Mail Drafts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker with a privileged network position may be able to intercept mail contents Description: An encryption issue existed in the handling of mail drafts. This issue was addressed with improved handling of mail drafts meant to be sent encrypted. CVE-2017-7078: an anonymous researcher, an anonymous researcher, an anonymous researcher
Mail MessageUI Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted image may lead to a denial of service Description: A memory corruption issue was addressed with improved validation. CVE-2017-7097: Xinshu Dong and Jun Hao Tan of Anquan Capital
Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted image may lead to a denial of service Description: A denial of service issue was addressed through improved validation. CVE-2017-7118: Kiki Jiang and Jason Tokoph
MobileBackup Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Backup may perform an unencrypted backup despite a requirement to perform only encrypted backups Description: A permissions issue existed. This issue was addressed with improved permission validation. CVE-2017-7133: Don Sparks of HackediOS.com
Phone Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A screenshot of secure content may be taken when locking an iOS device Description: A timing issue existed in the handling of locking. This issue was addressed by disabling screenshots while locking. CVE-2017-7139: an anonymous researcher
Quick Look Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13822: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
Quick Look Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-7132: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-7085: xisigr of Tencent's Xuanwu Lab (tencent.com)
Security Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A revoked certificate may be trusted Description: A certificate validation issue existed in the handling of revocation data. This issue was addressed through improved validation. CVE-2017-7080: an anonymous researcher, an anonymous researcher, Sven Driemecker of adesso mobile solutions gmbh, Rune Darrud (@theflyingcorpse) of BA|rum kommune
Security Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious app may be able to track users between installs Description: A permission checking issue existed in the handling of an app's Keychain data. This issue was addressed with improved permission checking. CVE-2017-7146: an anonymous researcher
SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Multiple issues in SQLite Description: Multiple issues were addressed by updating to version 3.19.3. CVE-2017-10989: found by OSS-Fuzz CVE-2017-7128: found by OSS-Fuzz CVE-2017-7129: found by OSS-Fuzz CVE-2017-7130: found by OSS-Fuzz
SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7127: an anonymous researcher
Time Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: "Setting Time Zone" may incorrectly indicate that it is using location Description: A permissions issue existed in the process that handles time zone information. The issue was resolved by modifying permissions. CVE-2017-7145: an anonymous researcher
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-7081: Apple
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7087: Apple CVE-2017-7091: Wei Yuan of Baidu Security Lab working with Trend Micro's Zero Day Initiative CVE-2017-7092: Samuel Gro and Niklas Baumstark working with Trend Micro's Zero Day Initiative, Qixun Zhao (@S0rryMybad) of Qihoo 360 Vulcan Team CVE-2017-7093: Samuel Gro and Niklas Baumstark working with Trend Micro's Zero Day Initiative CVE-2017-7094: Tim Michaud (@TimGMichaud) of Leviathan Security Group CVE-2017-7095: Wang Junjie, Wei Lei, and Liu Yang of Nanyang Technological University working with Trend Micro's Zero Day Initiative CVE-2017-7096: Wei Yuan of Baidu Security Lab CVE-2017-7098: Felipe Freitas of Instituto TecnolA3gico de AeronA!utica CVE-2017-7099: Apple CVE-2017-7100: Masato Kinugawa and Mario Heiderich of Cure53 CVE-2017-7102: Wang Junjie, Wei Lei, and Liu Yang of Nanyang Technological University CVE-2017-7104: likemeng of Baidu Secutity Lab CVE-2017-7107: Wang Junjie, Wei Lei, and Liu Yang of Nanyang Technological University CVE-2017-7111: likemeng of Baidu Security Lab (xlab.baidu.com) working with Trend Micro's Zero Day Initiative CVE-2017-7117: lokihardt of Google Project Zero CVE-2017-7120: chenqin (ee|) of Ant-financial Light-Year Security Lab
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of the parent-tab. This issue was addressed with improved state management. CVE-2017-7089: Anton Lopanitsyn of ONSEC, Frans RosA(c)n of Detectify
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Cookies belonging to one origin may be sent to another origin Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed by no longer returning cookies for custom URL schemes. CVE-2017-7090: Apple
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-7106: Oliver Paukstadt of Thinking Objects GmbH (to.com)
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: Application Cache policy may be unexpectedly applied. CVE-2017-7109: avlidienbrunn
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious website may be able to track users in Safari private browsing mode Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed with improved restrictions. CVE-2017-7144: an anonymous researcher
Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-11120: Gal Beniamini of Google Project Zero CVE-2017-11121: Gal Beniamini of Google Project Zero
Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Malicious code executing on the Wi-Fi chip may be able to execute arbitrary code with kernel privileges on the application processor Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7103: Gal Beniamini of Google Project Zero CVE-2017-7105: Gal Beniamini of Google Project Zero CVE-2017-7108: Gal Beniamini of Google Project Zero CVE-2017-7110: Gal Beniamini of Google Project Zero CVE-2017-7112: Gal Beniamini of Google Project Zero
Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Malicious code executing on the Wi-Fi chip may be able to execute arbitrary code with kernel privileges on the application processor Description: Multiple race conditions were addressed through improved validation. CVE-2017-7115: Gal Beniamini of Google Project Zero
Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Malicious code executing on the Wi-Fi chip may be able to read restricted kernel memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-7116: Gal Beniamini of Google Project Zero
zlib Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Multiple issues in zlib Description: Multiple issues were addressed by updating to version 1.2.11. CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "11".
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAln4u8QpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEb3gRAA mkMtw5g6ZpDFNK4MpKwfTbwIK7rNjxEh2VGvv+1VNTJJRewGiXcbl/cf5EefPJFR RpH+8u2jjl7rgEDwRPLYY4EixRTwvOVs46MS5lzkNKjwaIhBswH6ubFIkw2MRgn9 zBbAmixTDb2HVaG2vMtmDm1PmXMq7QMau4W+G0m40bwiNBAyrqcttiiJ1NxdZsBl LouPNKhaOCLPuDeHG6oJmPRcZCyIvNpXJGE9UA/LMKL5yPbZQpqJvYBznof/SVXq QxvLw1D60Ki+2L2ItXEVAaAfkKh50+cn34m7rhb4ZIv3/hE86BpoFRGaAhni+QGJ ugJ2FYciTPnbLttpZlBYfj29BMqqkYQ1HJ+xEQf3krKiQmGKWcRV4858h2GZRGkW wwd9l1Ym4vDTNK+0yVnN58XTyOjJh/dH8t+Bzp63OUFTLiab6/3kfccozlobbivF pZWt6fFqbn/e6Re62Xj0VfxlST5TjGqxZq0qgNJiWG9s5z0To3YcDXhJSsTyjtIj cLM13UTPFAPj+ReTaA0wczvjoq4J6EyVD2bDOHv/iKY+7xOO9+5vTYGD3nhKjdAo GFBCbpCtBrrrlAd6TtW1D15QBJ+/e/5uJYd9r2BIR/w3l5I7IAnNHtYV9zu/wvuM odr7Q4DNa5UQq0VMLbsd2avIoYX+xxKQg4WUv8BbkZI= =NYhG -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201707-0592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.5.12" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.6.0" }, { "model": "heimdal", "scope": "lt", "trust": 1.0, "vendor": "heimdal", "version": "7.4.0" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.0" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.13.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.0.0" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.6.6" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.4.15" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.5.0" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.4.1" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.4.4" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.4.3" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.4.2" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.3.9" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.3.11" }, { "model": "samba", "scope": "eq", "trust": 0.9, "vendor": "samba", "version": "4.3.10" }, { "model": "samba", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "4.4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "17.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "16.10" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "16.04" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.6.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.6.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.14" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.12" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.22" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.21" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.20" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.19" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.18" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.17" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.16" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.15" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.14" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.13" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.24" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.23" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.21" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.20" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.19" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.18" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.17" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.13" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.12" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.10" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.5.2" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.4.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.3.13" }, { "model": "4.2rc4", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.14" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.13" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.12" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.2.11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.23" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.1.11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.9" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.7" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.6" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.5" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.4" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.22" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.16" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.15" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.14" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.11" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "4.0.0" }, { "model": "heimdal", "scope": "eq", "trust": 0.3, "vendor": "heimdal", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "3.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "3.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.8" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.7" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "1.1.5.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "1.1.5" }, { "model": "9.3-release-p53", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p44", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p43", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p42", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p41", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p39", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p38", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p36", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p35", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p34", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p33", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p31", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p29", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-release-p15", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-release-p13", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-release-p12", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-release-p11", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-rc2-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-rc2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.2-rc1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "9.1-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p23", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p22", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p20", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p18", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p16", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p15", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p14", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p12", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p11", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.1-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.1" }, { "model": "10.2-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p8", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p28", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p26", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.2" }, { "model": "10.1-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p45", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p43", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p36", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p35", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p34", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p33", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p31", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p30", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p29", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p28", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p27", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p26", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p23", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p16", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc4-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc2-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-beta3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" }, { "model": "10.0-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p8", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p7", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p4", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p18", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p13", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p12", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.0-beta", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "1.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "1.1" }, { "model": "9.3-release-p51", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-30", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "4.6.6" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "4.5.12" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "4.4.15" }, { "model": "11.1-rc2-p1", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "11.1-rc1-p1", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "11.1-prerelease", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "11.1-beta3-p1", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "11.0-release-p11", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.3-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.3-release-p20", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null } ], "sources": [ { "db": "BID", "id": "99551" }, { "db": "CNNVD", "id": "CNNVD-201707-306" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.4.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.15", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.5.12", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.6.6", "versionStartIncluding": "4.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.13.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-11103" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "144366" }, { "db": "PACKETSTORM", "id": "144369" }, { "db": "PACKETSTORM", "id": "144827" }, { "db": "PACKETSTORM", "id": "144832" } ], "trust": 0.4 }, "cve": "CVE-2017-11103", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-101492", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-11103", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-11103", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201707-306", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-101492", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-11103", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-101492" }, { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "CNNVD", "id": "CNNVD-201707-306" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus\u0027 Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in \u0027enc_part\u0027 instead of the unencrypted version stored in \u0027ticket\u0027. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated. Heimdal is prone to a security-bypass vulnerability. \nSuccessfully exploiting this issue may allow attackers to bypass certain security restrictions and perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. Heimdal is a Kerberos 5 implementation. A data forgery issue vulnerability exists in Heimdal versions prior to 7.4. ===========================================================================\nUbuntu Security Notice USN-3353-3\nJuly 24, 2017\n\nheimdal vulnerability\n===========================================================================\n\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n Ubuntu 12.04 LTS\n\nSummary\n\nHeimdal could allow unintended access to network services. \nSoftware description\n\n heimdal - Heimdal Kerberos Network Authentication Protocol\n\nDetails\n\nUSN-3353-1 fixed a vulnerability in Heimdal. This update provides\nthe corresponding updade for Ubuntu 12.04 ESM. \n\nOriginal advisory details:\n\nJeffrey Altman, Viktor Dukhovni, and Nicolas Williams discovered\nthat Heimdal clients incorrectly trusted unauthenticated portions\nof Kerberos tickets. A remote attacker could use this to impersonate\ntrusted network services or perform other attacks. \n\nUpdate instructions\n\nThe problem can be corrected by updating your system to the following package version:\n\nUbuntu 12.04 LTS:\n libkrb5-26-heimdal 1.6~git20120311.dfsg.1-2ubuntu0.2 \n\nTo update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. \n\nAfter a standard system update you need to restart any applications\nusing Heimdal libraries to make all the necessary changes. \n\nReferences\n\nhttps://www.ubuntu.com/usn/usn-3353-3\nhttps://www.ubuntu.com/usn/usn-3353-1\nCVE-2017-11103 \n. \nCVE-2017-7074: Daniel Jalkut of Red Sweater Software\n\nCaptive Network Assistant\nAvailable for: OS X Lion v10.8 and later\nImpact: A local user may unknowingly send a password unencrypted over\nthe network\nDescription: The security state of the captive portal browser was not\nobvious. \nCVE-2016-9840\nCVE-2016-9841\nCVE-2016-9842\nCVE-2016-9843\nEntry added September 25, 2017\n\nAdditional recognition\n\nSecurity\nWe would like to acknowledge Abhinav Bansal of Zscaler, Inc. \nfor their assistance. \n\nWebkit\nWe would like to acknowledge xisigr of Tencent\u0027s Xuanwu Lab\n(tencent.com) for their assistance. \nCVE-2016-736\nCVE-2016-2161\nCVE-2016-5387\nCVE-2016-8740\nCVE-2016-8743\nCVE-2017-3167\nCVE-2017-3169\nCVE-2017-7659\nCVE-2017-7668\nCVE-2017-7679\nCVE-2017-9788\nCVE-2017-9789\n\nAPFS\nAvailable for: macOS High Sierra 10.13\nImpact: A malicious Thunderbolt adapter may be able to recover\nunencrypted APFS filesystem data\nDescription: An issue existed in the handling of DMA. This issue was\naddressed by limiting the time the FileVault decryption buffers are\nDMA mapped to the duration of the I/O operation. \nCVE-2017-1000101: Brian Carpenter, Yongji Ouyang\n\nDictionary Widget\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: Searching pasted text in the Dictionary widget may lead to\ncompromise of user information\nDescription: A validation issue existed which allowed local file\naccess. \nCVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. \nCVE-2017-11108\nCVE-2017-11541\nCVE-2017-11542\nCVE-2017-11543\nCVE-2017-12893\nCVE-2017-12894\nCVE-2017-12895\nCVE-2017-12896\nCVE-2017-12897\nCVE-2017-12898\nCVE-2017-12899\nCVE-2017-12900\nCVE-2017-12901\nCVE-2017-12902\nCVE-2017-12985\nCVE-2017-12986\nCVE-2017-12987\nCVE-2017-12988\nCVE-2017-12989\nCVE-2017-12990\nCVE-2017-12991\nCVE-2017-12992\nCVE-2017-12993\nCVE-2017-12994\nCVE-2017-12995\nCVE-2017-12996\nCVE-2017-12997\nCVE-2017-12998\nCVE-2017-12999\nCVE-2017-13000\nCVE-2017-13001\nCVE-2017-13002\nCVE-2017-13003\nCVE-2017-13004\nCVE-2017-13005\nCVE-2017-13006\nCVE-2017-13007\nCVE-2017-13008\nCVE-2017-13009\nCVE-2017-13010\nCVE-2017-13011\nCVE-2017-13012\nCVE-2017-13013\nCVE-2017-13014\nCVE-2017-13015\nCVE-2017-13016\nCVE-2017-13017\nCVE-2017-13018\nCVE-2017-13019\nCVE-2017-13020\nCVE-2017-13021\nCVE-2017-13022\nCVE-2017-13023\nCVE-2017-13024\nCVE-2017-13025\nCVE-2017-13026\nCVE-2017-13027\nCVE-2017-13028\nCVE-2017-13029\nCVE-2017-13030\nCVE-2017-13031\nCVE-2017-13032\nCVE-2017-13033\nCVE-2017-13034\nCVE-2017-13035\nCVE-2017-13036\nCVE-2017-13037\nCVE-2017-13038\nCVE-2017-13039\nCVE-2017-13040\nCVE-2017-13041\nCVE-2017-13042\nCVE-2017-13043\nCVE-2017-13044\nCVE-2017-13045\nCVE-2017-13046\nCVE-2017-13047\nCVE-2017-13048\nCVE-2017-13049\nCVE-2017-13050\nCVE-2017-13051\nCVE-2017-13052\nCVE-2017-13053\nCVE-2017-13054\nCVE-2017-13055\nCVE-2017-13687\nCVE-2017-13688\nCVE-2017-13689\nCVE-2017-13690\nCVE-2017-13725\n\nWi-Fi\nAvailable for: macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El\nCapitan 10.11.6\nImpact: An attacker in Wi-Fi range may force nonce reuse in WPA\nclients (Key Reinstallation Attacks - KRACK)\nDescription: A logic issue existed in the handling of state\ntransitions. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-10-31-9\nAdditional information for APPLE-SA-2017-09-19-1 iOS 11\n\niOS 11 addresses the following:\n\n802.1X\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker may be able to exploit weaknesses in TLS 1.0\nDescription: A protocol security issue was addressed by enabling TLS\n1.1 and TLS 1.2. \nCVE-2017-13832: an anonymous researcher\nEntry added October 31, 2017\n\nBluetooth\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to access restricted files\nDescription: A privacy issue existed in the handling of Contact\ncards. This was addressed with improved state management. \nCVE-2017-7131: Dominik Conrads of Federal Office for Information\nSecurity, an anonymous researcher, Elvis (@elvisimprsntr), an\nanonymous researcher\n\nCFNetwork Proxies\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An attacker in a privileged network position may be able to\ncause a denial of service\nDescription: Multiple denial of service issues were addressed through\nimproved memory handling. \nCVE-2017-7083: Abhinav Bansal of Zscaler Inc. \n\nCFString\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13821: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nCoreAudio\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed by updating to Opus\nversion 1.1.4. \nCVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend\nMicro\n\nCoreText\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-13825: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nExchange ActiveSync\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An attacker in a privileged network position may be able to\nerase a device during Exchange account setup\nDescription: A validation issue existed in AutoDiscover V1. This was\naddressed by requiring TLS for AutoDiscover V1. AutoDiscover V2 is\nnow supported. \nCVE-2017-7088: Ilya Nesterov, Maxim Goncharov\n\nfile\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Multiple issues in file\nDescription: Multiple issues were addressed by updating to version\n5.31. \nCVE-2017-13815\nEntry added October 31, 2017\n\nFonts\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Rendering untrusted text may lead to spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-13828: an anonymous researcher\nEntry added October 31, 2017\n\nHeimdal\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker in a privileged network position may be able\nto impersonate a service\nDescription: A validation issue existed in the handling of\nthe KDC-REP service name. This issue was addressed through improved\nvalidation. \nCVE-2017-11103: Jeffrey Altman, Viktor Duchovni, and Nico Williams\n\nHFS\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum\nEntry added October 31, 2017\n\niBooks\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Parsing a maliciously crafted iBooks file may lead to a\npersistent denial-of-service\nDescription: Multiple denial of service issues were addressed through\nimproved memory handling. \nCVE-2017-7072: JAdrzej Krysztofiak\n\nImageIO\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-13814: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nImageIO\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: An information disclosure issue existed in the\nprocessing of disk images. This issue was addressed through improved\nmemory management. \nCVE-2017-13831: an anonymous researcher\nEntry added October 31, 2017\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7114: Alex Plaskett of MWR InfoSecurity\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local user may be able to read kernel memory\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-2017-13817: Maxime Villard (m00nbsd)\nEntry added October 31, 2017\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13818: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2017-13836: an anonymous researcher, an anonymous researcher\nCVE-2017-13841: an anonymous researcher\nCVE-2017-13840: an anonymous researcher\nCVE-2017-13842: an anonymous researcher\nCVE-2017-13782: Kevin Backhouse of Semmle Ltd. \nEntry added October 31, 2017\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13843: an anonymous researcher\nEntry added October 31, 2017\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a malformed mach binary may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed through improved\nvalidation. \nCVE-2017-13834: Maxime Villard (m00nbsd)\nEntry added October 31, 2017\n\nKeyboard Suggestions\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Keyboard autocorrect suggestions may reveal sensitive\ninformation\nDescription: The iOS keyboard was inadvertently caching sensitive\ninformation. This issue was addressed with improved heuristics. \nCVE-2017-7140: an anonymous researcher\n\nlibarchive\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-13813: found by OSS-Fuzz\nCVE-2017-13816: found by OSS-Fuzz\nEntry added October 31, 2017\n\nlibarchive\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in libarchive. \nThese issues were addressed through improved input validation. \nCVE-2017-13812: found by OSS-Fuzz\nEntry added October 31, 2017\n\nlibc\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: A remote attacker may be able to cause a denial-of-service\nDescription: A resource exhaustion issue in glob() was addressed\nthrough an improved algorithm. \nCVE-2017-7086: Russ Cox of Google\n\nlibc\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to cause a denial of service\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-1000373\n\nlibexpat\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Multiple issues in expat\nDescription: Multiple issues were addressed by updating to version\n2.2.1\nCVE-2016-9063\nCVE-2017-9233\n\nLocation Framework\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to read sensitive location\ninformation\nDescription: A permissions issue existed in the handling of the\nlocation variable. This was addressed with additional ownership\nchecks. \nCVE-2017-7148: an anonymous researcher, an anonymous researcher\n\nMail Drafts\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An attacker with a privileged network position may be able to\nintercept mail contents\nDescription: An encryption issue existed in the handling of mail\ndrafts. This issue was addressed with improved handling of mail\ndrafts meant to be sent encrypted. \nCVE-2017-7078: an anonymous researcher, an anonymous researcher, an\nanonymous researcher\n\nMail MessageUI\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2017-7097: Xinshu Dong and Jun Hao Tan of Anquan Capital\n\nMessages\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: A denial of service issue was addressed through improved\nvalidation. \nCVE-2017-7118: Kiki Jiang and Jason Tokoph\n\nMobileBackup\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Backup may perform an unencrypted backup despite a\nrequirement to perform only encrypted backups\nDescription: A permissions issue existed. This issue was addressed\nwith improved permission validation. \nCVE-2017-7133: Don Sparks of HackediOS.com\n\nPhone\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: A screenshot of secure content may be taken when locking an\niOS device\nDescription: A timing issue existed in the handling of locking. This\nissue was addressed by disabling screenshots while locking. \nCVE-2017-7139: an anonymous researcher\n\nQuick Look\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13822: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nQuick Look\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-7132: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nSafari\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-7085: xisigr of Tencent\u0027s Xuanwu Lab (tencent.com)\n\nSecurity\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: A revoked certificate may be trusted\nDescription: A certificate validation issue existed in the handling\nof revocation data. This issue was addressed through improved\nvalidation. \nCVE-2017-7080: an anonymous researcher, an anonymous researcher,\nSven Driemecker of adesso mobile solutions gmbh,\nRune Darrud (@theflyingcorpse) of BA|rum kommune\n\nSecurity\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: A malicious app may be able to track users between installs\nDescription: A permission checking issue existed in the handling of\nan app\u0027s Keychain data. This issue was addressed with improved\npermission checking. \nCVE-2017-7146: an anonymous researcher\n\nSQLite\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Multiple issues in SQLite\nDescription: Multiple issues were addressed by updating to\nversion 3.19.3. \nCVE-2017-10989: found by OSS-Fuzz\nCVE-2017-7128: found by OSS-Fuzz\nCVE-2017-7129: found by OSS-Fuzz\nCVE-2017-7130: found by OSS-Fuzz\n\nSQLite\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7127: an anonymous researcher\n\nTime\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: \"Setting Time Zone\" may incorrectly indicate that it is using\nlocation\nDescription: A permissions issue existed in the process that handles\ntime zone information. The issue was resolved by modifying\npermissions. \nCVE-2017-7145: an anonymous researcher\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-7081: Apple\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-7087: Apple\nCVE-2017-7091: Wei Yuan of Baidu Security Lab working with Trend\nMicro\u0027s Zero Day Initiative\nCVE-2017-7092: Samuel Gro and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative, Qixun Zhao (@S0rryMybad) of Qihoo 360\nVulcan Team\nCVE-2017-7093: Samuel Gro and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\nCVE-2017-7094: Tim Michaud (@TimGMichaud) of Leviathan Security Group\nCVE-2017-7095: Wang Junjie, Wei Lei, and Liu Yang of Nanyang\nTechnological University working with Trend Micro\u0027s Zero Day\nInitiative\nCVE-2017-7096: Wei Yuan of Baidu Security Lab\nCVE-2017-7098: Felipe Freitas of Instituto TecnolA3gico de AeronA!utica\nCVE-2017-7099: Apple\nCVE-2017-7100: Masato Kinugawa and Mario Heiderich of Cure53\nCVE-2017-7102: Wang Junjie, Wei Lei, and Liu Yang of Nanyang\nTechnological University\nCVE-2017-7104: likemeng of Baidu Secutity Lab\nCVE-2017-7107: Wang Junjie, Wei Lei, and Liu Yang of Nanyang\nTechnological University\nCVE-2017-7111: likemeng of Baidu Security Lab (xlab.baidu.com)\nworking with Trend Micro\u0027s Zero Day Initiative\nCVE-2017-7117: lokihardt of Google Project Zero\nCVE-2017-7120: chenqin (ee|) of Ant-financial Light-Year Security\nLab\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in the handling of the parent-tab. \nThis issue was addressed with improved state management. \nCVE-2017-7089: Anton Lopanitsyn of ONSEC, Frans RosA(c)n of Detectify\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Cookies belonging to one origin may be sent to another origin\nDescription: A permissions issue existed in the handling of web\nbrowser cookies. This issue was addressed by no longer returning\ncookies for custom URL schemes. \nCVE-2017-7090: Apple\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-7106: Oliver Paukstadt of Thinking Objects GmbH (to.com)\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to a\ncross site scripting attack\nDescription: Application Cache policy may be unexpectedly applied. \nCVE-2017-7109: avlidienbrunn\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: A malicious website may be able to track users in Safari\nprivate browsing mode\nDescription: A permissions issue existed in the handling of web\nbrowser cookies. This issue was addressed with improved restrictions. \nCVE-2017-7144: an anonymous researcher\n\nWi-Fi\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: An attacker within range may be able to execute arbitrary\ncode on the Wi-Fi chip\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-11120: Gal Beniamini of Google Project Zero\nCVE-2017-11121: Gal Beniamini of Google Project Zero\n\nWi-Fi\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Malicious code executing on the Wi-Fi chip may be able to\nexecute arbitrary code with kernel privileges on the application\nprocessor\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7103: Gal Beniamini of Google Project Zero\nCVE-2017-7105: Gal Beniamini of Google Project Zero\nCVE-2017-7108: Gal Beniamini of Google Project Zero\nCVE-2017-7110: Gal Beniamini of Google Project Zero\nCVE-2017-7112: Gal Beniamini of Google Project Zero\n\nWi-Fi\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Malicious code executing on the Wi-Fi chip may be able to\nexecute arbitrary code with kernel privileges on the application\nprocessor\nDescription: Multiple race conditions were addressed through improved\nvalidation. \nCVE-2017-7115: Gal Beniamini of Google Project Zero\n\nWi-Fi\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Malicious code executing on the Wi-Fi chip may be able to\nread restricted kernel memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-7116: Gal Beniamini of Google Project Zero\n\nzlib\nAvailable for: iPhone 5s and later, iPad Air and later,\nand iPod touch 6th generation\nImpact: Multiple issues in zlib\nDescription: Multiple issues were addressed by updating to version\n1.2.11. \nCVE-2016-9840\nCVE-2016-9841\nCVE-2016-9842\nCVE-2016-9843\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"11\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nodr7Q4DNa5UQq0VMLbsd2avIoYX+xxKQg4WUv8BbkZI=\n=NYhG\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2017-11103" }, { "db": "BID", "id": "99551" }, { "db": "VULHUB", "id": "VHN-101492" }, { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "PACKETSTORM", "id": "143453" }, { "db": "PACKETSTORM", "id": "144366" }, { "db": "PACKETSTORM", "id": "144369" }, { "db": "PACKETSTORM", "id": "144827" }, { "db": "PACKETSTORM", "id": "144832" }, { "db": "PACKETSTORM", "id": "143371" }, { "db": "PACKETSTORM", "id": "143370" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-11103", "trust": 2.8 }, { "db": "BID", "id": "99551", "trust": 2.1 }, { "db": "SECTRACK", "id": "1038876", "trust": 1.8 }, { "db": "SECTRACK", "id": "1039427", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-201707-306", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "143371", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143370", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143453", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143456", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-101492", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-11103", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144366", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144369", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144827", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144832", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-101492" }, { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "BID", "id": "99551" }, { "db": "PACKETSTORM", "id": "143453" }, { "db": "PACKETSTORM", "id": "144366" }, { "db": "PACKETSTORM", "id": "144369" }, { "db": "PACKETSTORM", "id": "144827" }, { "db": "PACKETSTORM", "id": "144832" }, { "db": "PACKETSTORM", "id": "143371" }, { "db": "PACKETSTORM", "id": "143370" }, { "db": "CNNVD", "id": "CNNVD-201707-306" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "id": "VAR-201707-0592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-101492" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T22:02:33.954000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Heimdal Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71551" }, { "title": "Ubuntu Security Notice: samba vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3353-2" }, { "title": "Debian Security Advisories: DSA-3912-1 heimdal -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6427d24d8710512ea02b4e9d885bec1f" }, { "title": "Debian Security Advisories: DSA-3909-1 samba -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=ea33efc29aab46b61ec7f9901aff0694" }, { "title": "Debian CVElist Bug Report Logs: CVE-2017-11103: MitM attack, impersonation of the Kerberos client, know as Orpheus Lyre", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4ccdc4bbd49d810162c7818812f6cbdd" }, { "title": "Ubuntu Security Notice: heimdal vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3353-3" }, { "title": "Ubuntu Security Notice: heimdal vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3353-1" }, { "title": "Ubuntu Security Notice: samba vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3353-4" }, { "title": "Brocade Security Advisories: BSA-2017-384", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories\u0026qid=c7c03bca3e098a20f327665b9510e314" }, { "title": "Apple: macOS High Sierra 10.13", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=dc5ef303c64758e2c6d76a32028764e1" }, { "title": "Apple: iOS 11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=041cce4eee20b18dc79e9460a53e8400" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a22ad41e97bbfc5abb0bb927bf43089c" }, { "title": "Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=870f3f04ef17f7b183f74ae687a1561d" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/21-year-old-bug-in-kerberos-protocol-gets-patch-in-windows-linux/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "CNNVD", "id": "CNNVD-201707-306" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-101492" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://www.samba.org/samba/security/cve-2017-11103.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/99551" }, { "trust": 1.8, "url": "http://www.h5l.org/advisories.html?show=2017-07-11" }, { "trust": 1.8, "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0" }, { "trust": 1.8, "url": "https://support.apple.com/ht208112" }, { "trust": 1.8, "url": "https://support.apple.com/ht208144" }, { "trust": 1.8, "url": "https://support.apple.com/ht208221" }, { "trust": 1.8, "url": "http://www.debian.org/security/2017/dsa-3912" }, { "trust": 1.8, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17:05.heimdal.asc" }, { "trust": 1.8, "url": "https://www.orpheus-lyre.info/" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1038876" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1039427" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11103" }, { "trust": 0.4, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.4, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2017-11103" }, { "trust": 0.3, "url": "https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea" }, { "trust": 0.3, "url": "http://www.freebsd.org/" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2017-11103" }, { "trust": 0.3, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-17%3a05.heimdal.asc" }, { "trust": 0.3, "url": "https://www.ubuntu.com/usn/usn-3353-1" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10989" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0381" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9842" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000373" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9840" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9063" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9841" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9843" }, { "trust": 0.2, "url": "https://gpgtools.org" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7080" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7078" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7083" }, { "trust": 0.2, "url": "https://www.apple.com/support/downloads/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7086" }, { "trust": 0.2, "url": "https://www.apple.com/itunes/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11120" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11121" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/345.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3353-2/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://wiki.ubuntu.com/security/upgrades." }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3353-3" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7114" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6451" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6460" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7077" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6459" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6458" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7074" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9042" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6463" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7082" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6455" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6452" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6462" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7084" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6464" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7072" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7094" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7093" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7090" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7087" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7092" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7081" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7096" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7095" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7088" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5387" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12896" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12897" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12898" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8743" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11542" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12986" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000100" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1298" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12894" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12985" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12899" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12900" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12902" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000101" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12987" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13817" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13831" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13828" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13822" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13825" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13821" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13818" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13813" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13812" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13815" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.4.5+dfsg-2ubuntu5.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.5.8+dfsg-0ubuntu0.17.04.4" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3353-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04.10" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.9" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/heimdal/7.1.0+dfsg-9ubuntu1.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/heimdal/1.7~git20150920+dfsg-4ubuntu1.16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/heimdal/1.7~git20150920+dfsg-4ubuntu1.16.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/heimdal/1.6~git20131207+dfsg-1ubuntu1.2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-101492" }, { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "BID", "id": "99551" }, { "db": "PACKETSTORM", "id": "143453" }, { "db": "PACKETSTORM", "id": "144366" }, { "db": "PACKETSTORM", "id": "144369" }, { "db": "PACKETSTORM", "id": "144827" }, { "db": "PACKETSTORM", "id": "144832" }, { "db": "PACKETSTORM", "id": "143371" }, { "db": "PACKETSTORM", "id": "143370" }, { "db": "CNNVD", "id": "CNNVD-201707-306" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-101492" }, { "db": "VULMON", "id": "CVE-2017-11103" }, { "db": "BID", "id": "99551" }, { "db": "PACKETSTORM", "id": "143453" }, { "db": "PACKETSTORM", "id": "144366" }, { "db": "PACKETSTORM", "id": "144369" }, { "db": "PACKETSTORM", "id": "144827" }, { "db": "PACKETSTORM", "id": "144832" }, { "db": "PACKETSTORM", "id": "143371" }, { "db": "PACKETSTORM", "id": "143370" }, { "db": "CNNVD", "id": "CNNVD-201707-306" }, { "db": "NVD", "id": "CVE-2017-11103" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-13T00:00:00", "db": "VULHUB", "id": "VHN-101492" }, { "date": "2017-07-13T00:00:00", "db": "VULMON", "id": "CVE-2017-11103" }, { "date": "2017-07-12T00:00:00", "db": "BID", "id": "99551" }, { "date": "2017-07-24T23:51:48", "db": "PACKETSTORM", "id": "143453" }, { "date": "2017-09-28T00:13:55", "db": "PACKETSTORM", "id": "144366" }, { "date": "2017-09-28T00:19:32", "db": "PACKETSTORM", "id": "144369" }, { "date": "2017-11-01T15:41:26", "db": "PACKETSTORM", "id": "144827" }, { "date": "2017-11-01T15:51:56", "db": "PACKETSTORM", "id": "144832" }, { "date": "2017-07-14T19:22:00", "db": "PACKETSTORM", "id": "143371" }, { "date": "2017-07-14T19:19:00", "db": "PACKETSTORM", "id": "143370" }, { "date": "2017-07-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-306" }, { "date": "2017-07-13T13:29:00.173000", "db": "NVD", "id": "CVE-2017-11103" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-18T00:00:00", "db": "VULHUB", "id": "VHN-101492" }, { "date": "2020-08-18T00:00:00", "db": "VULMON", "id": "CVE-2017-11103" }, { "date": "2017-07-17T08:07:00", "db": "BID", "id": "99551" }, { "date": "2019-11-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-306" }, { "date": "2020-08-18T15:05:49.313000", "db": "NVD", "id": "CVE-2017-11103" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "143371" }, { "db": "PACKETSTORM", "id": "143370" }, { "db": "CNNVD", "id": "CNNVD-201707-306" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heimdal Data forgery problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-306" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-306" } ], "trust": 0.6 } }
var-201204-0112
Vulnerability from variot
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way Samba handles GetAliasMembership requests. When parsing the data send in the request Samba uses the field 'sids' to create a heap allocation but then uses another field, 'num_sids', to write data to the allocation. Because there is no check to see if 'num_sids' is smaller than 'sids' this could result in a heap buffer overflow that could lead to remote code execution. By sending a specially crafted packet, it is possible to cause Samba to use a different size for memory allocation than it uses for a memory copy loop. Samba is prone to a remote-code-execution vulnerability. Failed exploit attempts will cause a denial-of-service condition. Samba versions 3.0 through 3.6.3 are vulnerable. (CVE-2012-1182)
The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC).
The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages.
Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, "Samba4 Package Support" in the Release Notes, linked to from the References. (BZ#766333, BZ#882188)
This update also fixes the following bug:
-
Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by "wbinfo -n" or "wbinfo -s" commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. 867854 - auth_builtin auth_domain auth_sam and auth_winbind are built as shared modules. 868248 - samba-winbind package wants /var/log/samba 868419 - samba4 smb and winbind init scripts missing export KRB5CCNAME 877085 - Wrong sysconfig filename 878564 - IPA trust cannot always lookup AD users with wbinfo 882188 - samba4-libs: yyin symbol collision 885089 - Samba netlogon AES support incorrect 886157 - samba4 should use the same winbind pipes as samba 895718 - Incomplete rpm provides filters causes issues with the samba4-libs package on certain architectures
-
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Samba RPC Network Data Representation Marshalling Vulnerability
SECUNIA ADVISORY ID: SA48742
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48742/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48742
RELEASE DATE: 2012-04-11
DISCUSS ADVISORY: http://secunia.com/advisories/48742/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48742/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48742
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Samba, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an error within the Network Data Representation (NDR) marshalling functionality when marshalling RPC calls and can be exploited via a specially crafted remote procedure call.
The vulnerability is reported in versions prior to 3.0.37, 3.2.15, 3.3.16, 3.4.15, 3.5.13, and 3.6.3.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Brian Gorenc and an anonymous person via ZDI.
ORIGINAL ADVISORY: http://www.samba.org/samba/security/CVE-2012-1182
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: samba security update Advisory ID: RHSA-2012:0465-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0465.html Issue date: 2012-04-10 CVE Names: CVE-2012-1182 =====================================================================
- Summary:
Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life; and Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support.
The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.0) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.1) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6.0.z) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information.
A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. (CVE-2012-1182)
Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
804093 - CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm
i386: libsmbclient-3.0.33-3.39.el5_8.i386.rpm samba-3.0.33-3.39.el5_8.i386.rpm samba-client-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-swat-3.0.33-3.39.el5_8.i386.rpm
x86_64: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-3.0.33-3.39.el5_8.x86_64.rpm samba-3.0.33-3.39.el5_8.x86_64.rpm samba-client-3.0.33-3.39.el5_8.x86_64.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm samba-swat-3.0.33-3.39.el5_8.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm
i386: libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm
x86_64: libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm
Red Hat Enterprise Linux Long Life (v. 5.3 server):
Source: samba-3.0.33-3.7.el5_3.5.src.rpm
i386: samba-3.0.33-3.7.el5_3.5.i386.rpm samba-client-3.0.33-3.7.el5_3.5.i386.rpm samba-common-3.0.33-3.7.el5_3.5.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm samba-swat-3.0.33-3.7.el5_3.5.i386.rpm
ia64: samba-3.0.33-3.7.el5_3.5.ia64.rpm samba-client-3.0.33-3.7.el5_3.5.ia64.rpm samba-common-3.0.33-3.7.el5_3.5.ia64.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.ia64.rpm samba-swat-3.0.33-3.7.el5_3.5.ia64.rpm
x86_64: samba-3.0.33-3.7.el5_3.5.x86_64.rpm samba-client-3.0.33-3.7.el5_3.5.x86_64.rpm samba-common-3.0.33-3.7.el5_3.5.i386.rpm samba-common-3.0.33-3.7.el5_3.5.x86_64.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.x86_64.rpm samba-swat-3.0.33-3.7.el5_3.5.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.6 server):
Source: samba-3.0.33-3.29.el5_6.5.src.rpm
i386: libsmbclient-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm samba-3.0.33-3.29.el5_6.5.i386.rpm samba-client-3.0.33-3.29.el5_6.5.i386.rpm samba-common-3.0.33-3.29.el5_6.5.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm samba-swat-3.0.33-3.29.el5_6.5.i386.rpm
ia64: libsmbclient-3.0.33-3.29.el5_6.5.ia64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ia64.rpm samba-3.0.33-3.29.el5_6.5.ia64.rpm samba-client-3.0.33-3.29.el5_6.5.ia64.rpm samba-common-3.0.33-3.29.el5_6.5.ia64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ia64.rpm samba-swat-3.0.33-3.29.el5_6.5.ia64.rpm
ppc: libsmbclient-3.0.33-3.29.el5_6.5.ppc.rpm libsmbclient-3.0.33-3.29.el5_6.5.ppc64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ppc.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ppc64.rpm samba-3.0.33-3.29.el5_6.5.ppc.rpm samba-client-3.0.33-3.29.el5_6.5.ppc.rpm samba-common-3.0.33-3.29.el5_6.5.ppc.rpm samba-common-3.0.33-3.29.el5_6.5.ppc64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ppc.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ppc64.rpm samba-swat-3.0.33-3.29.el5_6.5.ppc.rpm
s390x: libsmbclient-3.0.33-3.29.el5_6.5.s390.rpm libsmbclient-3.0.33-3.29.el5_6.5.s390x.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.s390.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.s390x.rpm samba-3.0.33-3.29.el5_6.5.s390x.rpm samba-client-3.0.33-3.29.el5_6.5.s390x.rpm samba-common-3.0.33-3.29.el5_6.5.s390.rpm samba-common-3.0.33-3.29.el5_6.5.s390x.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.s390.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.s390x.rpm samba-swat-3.0.33-3.29.el5_6.5.s390x.rpm
x86_64: libsmbclient-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-3.0.33-3.29.el5_6.5.x86_64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.x86_64.rpm samba-3.0.33-3.29.el5_6.5.x86_64.rpm samba-client-3.0.33-3.29.el5_6.5.x86_64.rpm samba-common-3.0.33-3.29.el5_6.5.i386.rpm samba-common-3.0.33-3.29.el5_6.5.x86_64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.x86_64.rpm samba-swat-3.0.33-3.29.el5_6.5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm
i386: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm samba-3.0.33-3.39.el5_8.i386.rpm samba-client-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-swat-3.0.33-3.39.el5_8.i386.rpm
ia64: libsmbclient-3.0.33-3.39.el5_8.ia64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ia64.rpm samba-3.0.33-3.39.el5_8.ia64.rpm samba-client-3.0.33-3.39.el5_8.ia64.rpm samba-common-3.0.33-3.39.el5_8.ia64.rpm samba-debuginfo-3.0.33-3.39.el5_8.ia64.rpm samba-swat-3.0.33-3.39.el5_8.ia64.rpm
ppc: libsmbclient-3.0.33-3.39.el5_8.ppc.rpm libsmbclient-3.0.33-3.39.el5_8.ppc64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ppc.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ppc64.rpm samba-3.0.33-3.39.el5_8.ppc.rpm samba-client-3.0.33-3.39.el5_8.ppc.rpm samba-common-3.0.33-3.39.el5_8.ppc.rpm samba-common-3.0.33-3.39.el5_8.ppc64.rpm samba-debuginfo-3.0.33-3.39.el5_8.ppc.rpm samba-debuginfo-3.0.33-3.39.el5_8.ppc64.rpm samba-swat-3.0.33-3.39.el5_8.ppc.rpm
s390x: libsmbclient-3.0.33-3.39.el5_8.s390.rpm libsmbclient-3.0.33-3.39.el5_8.s390x.rpm libsmbclient-devel-3.0.33-3.39.el5_8.s390.rpm libsmbclient-devel-3.0.33-3.39.el5_8.s390x.rpm samba-3.0.33-3.39.el5_8.s390x.rpm samba-client-3.0.33-3.39.el5_8.s390x.rpm samba-common-3.0.33-3.39.el5_8.s390.rpm samba-common-3.0.33-3.39.el5_8.s390x.rpm samba-debuginfo-3.0.33-3.39.el5_8.s390.rpm samba-debuginfo-3.0.33-3.39.el5_8.s390x.rpm samba-swat-3.0.33-3.39.el5_8.s390x.rpm
x86_64: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-3.0.33-3.39.el5_8.x86_64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm samba-3.0.33-3.39.el5_8.x86_64.rpm samba-client-3.0.33-3.39.el5_8.x86_64.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm samba-swat-3.0.33-3.39.el5_8.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm
x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm
x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
x86_64: samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.0):
Source: samba-3.5.4-68.el6_0.3.src.rpm
i386: libsmbclient-3.5.4-68.el6_0.3.i686.rpm samba-3.5.4-68.el6_0.3.i686.rpm samba-client-3.5.4-68.el6_0.3.i686.rpm samba-common-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-winbind-3.5.4-68.el6_0.3.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm
ppc64: libsmbclient-3.5.4-68.el6_0.3.ppc.rpm libsmbclient-3.5.4-68.el6_0.3.ppc64.rpm samba-3.5.4-68.el6_0.3.ppc64.rpm samba-client-3.5.4-68.el6_0.3.ppc64.rpm samba-common-3.5.4-68.el6_0.3.ppc.rpm samba-common-3.5.4-68.el6_0.3.ppc64.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-clients-3.5.4-68.el6_0.3.ppc.rpm samba-winbind-clients-3.5.4-68.el6_0.3.ppc64.rpm
s390x: libsmbclient-3.5.4-68.el6_0.3.s390.rpm libsmbclient-3.5.4-68.el6_0.3.s390x.rpm samba-3.5.4-68.el6_0.3.s390x.rpm samba-client-3.5.4-68.el6_0.3.s390x.rpm samba-common-3.5.4-68.el6_0.3.s390.rpm samba-common-3.5.4-68.el6_0.3.s390x.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-clients-3.5.4-68.el6_0.3.s390.rpm samba-winbind-clients-3.5.4-68.el6_0.3.s390x.rpm
x86_64: libsmbclient-3.5.4-68.el6_0.3.i686.rpm libsmbclient-3.5.4-68.el6_0.3.x86_64.rpm samba-3.5.4-68.el6_0.3.x86_64.rpm samba-client-3.5.4-68.el6_0.3.x86_64.rpm samba-common-3.5.4-68.el6_0.3.i686.rpm samba-common-3.5.4-68.el6_0.3.x86_64.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.3.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.1):
Source: samba-3.5.6-86.el6_1.5.src.rpm
i386: libsmbclient-3.5.6-86.el6_1.5.i686.rpm samba-3.5.6-86.el6_1.5.i686.rpm samba-client-3.5.6-86.el6_1.5.i686.rpm samba-common-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-winbind-3.5.6-86.el6_1.5.i686.rpm samba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm
ppc64: libsmbclient-3.5.6-86.el6_1.5.ppc.rpm libsmbclient-3.5.6-86.el6_1.5.ppc64.rpm samba-3.5.6-86.el6_1.5.ppc64.rpm samba-client-3.5.6-86.el6_1.5.ppc64.rpm samba-common-3.5.6-86.el6_1.5.ppc.rpm samba-common-3.5.6-86.el6_1.5.ppc64.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-clients-3.5.6-86.el6_1.5.ppc.rpm samba-winbind-clients-3.5.6-86.el6_1.5.ppc64.rpm
s390x: libsmbclient-3.5.6-86.el6_1.5.s390.rpm libsmbclient-3.5.6-86.el6_1.5.s390x.rpm samba-3.5.6-86.el6_1.5.s390x.rpm samba-client-3.5.6-86.el6_1.5.s390x.rpm samba-common-3.5.6-86.el6_1.5.s390.rpm samba-common-3.5.6-86.el6_1.5.s390x.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-clients-3.5.6-86.el6_1.5.s390.rpm samba-winbind-clients-3.5.6-86.el6_1.5.s390x.rpm
x86_64: libsmbclient-3.5.6-86.el6_1.5.i686.rpm libsmbclient-3.5.6-86.el6_1.5.x86_64.rpm samba-3.5.6-86.el6_1.5.x86_64.rpm samba-client-3.5.6-86.el6_1.5.x86_64.rpm samba-common-3.5.6-86.el6_1.5.i686.rpm samba-common-3.5.6-86.el6_1.5.x86_64.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm samba-winbind-clients-3.5.6-86.el6_1.5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm
ppc64: libsmbclient-3.5.10-115.el6_2.ppc.rpm libsmbclient-3.5.10-115.el6_2.ppc64.rpm samba-3.5.10-115.el6_2.ppc64.rpm samba-client-3.5.10-115.el6_2.ppc64.rpm samba-common-3.5.10-115.el6_2.ppc.rpm samba-common-3.5.10-115.el6_2.ppc64.rpm samba-debuginfo-3.5.10-115.el6_2.ppc.rpm samba-debuginfo-3.5.10-115.el6_2.ppc64.rpm samba-winbind-3.5.10-115.el6_2.ppc64.rpm samba-winbind-clients-3.5.10-115.el6_2.ppc.rpm samba-winbind-clients-3.5.10-115.el6_2.ppc64.rpm
s390x: libsmbclient-3.5.10-115.el6_2.s390.rpm libsmbclient-3.5.10-115.el6_2.s390x.rpm samba-3.5.10-115.el6_2.s390x.rpm samba-client-3.5.10-115.el6_2.s390x.rpm samba-common-3.5.10-115.el6_2.s390.rpm samba-common-3.5.10-115.el6_2.s390x.rpm samba-debuginfo-3.5.10-115.el6_2.s390.rpm samba-debuginfo-3.5.10-115.el6_2.s390x.rpm samba-winbind-3.5.10-115.el6_2.s390x.rpm samba-winbind-clients-3.5.10-115.el6_2.s390.rpm samba-winbind-clients-3.5.10-115.el6_2.s390x.rpm
x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6.0.z):
Source: samba-3.5.4-68.el6_0.3.src.rpm
i386: libsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-doc-3.5.4-68.el6_0.3.i686.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.i686.rpm samba-swat-3.5.4-68.el6_0.3.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm
ppc64: libsmbclient-devel-3.5.4-68.el6_0.3.ppc.rpm libsmbclient-devel-3.5.4-68.el6_0.3.ppc64.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm samba-doc-3.5.4-68.el6_0.3.ppc64.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.ppc64.rpm samba-swat-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-devel-3.5.4-68.el6_0.3.ppc.rpm samba-winbind-devel-3.5.4-68.el6_0.3.ppc64.rpm
s390x: libsmbclient-devel-3.5.4-68.el6_0.3.s390.rpm libsmbclient-devel-3.5.4-68.el6_0.3.s390x.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm samba-doc-3.5.4-68.el6_0.3.s390x.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.s390x.rpm samba-swat-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-devel-3.5.4-68.el6_0.3.s390.rpm samba-winbind-devel-3.5.4-68.el6_0.3.s390x.rpm
x86_64: libsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm libsmbclient-devel-3.5.4-68.el6_0.3.x86_64.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm samba-doc-3.5.4-68.el6_0.3.x86_64.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.x86_64.rpm samba-swat-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: samba-3.5.6-86.el6_1.5.src.rpm
i386: libsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-doc-3.5.6-86.el6_1.5.i686.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.i686.rpm samba-swat-3.5.6-86.el6_1.5.i686.rpm samba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.i686.rpm
ppc64: libsmbclient-devel-3.5.6-86.el6_1.5.ppc.rpm libsmbclient-devel-3.5.6-86.el6_1.5.ppc64.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm samba-doc-3.5.6-86.el6_1.5.ppc64.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.ppc64.rpm samba-swat-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-devel-3.5.6-86.el6_1.5.ppc.rpm samba-winbind-devel-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.ppc64.rpm
s390x: libsmbclient-devel-3.5.6-86.el6_1.5.s390.rpm libsmbclient-devel-3.5.6-86.el6_1.5.s390x.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm samba-doc-3.5.6-86.el6_1.5.s390x.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.s390x.rpm samba-swat-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-devel-3.5.6-86.el6_1.5.s390.rpm samba-winbind-devel-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.s390x.rpm
x86_64: libsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm libsmbclient-devel-3.5.6-86.el6_1.5.x86_64.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm samba-doc-3.5.6-86.el6_1.5.x86_64.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.x86_64.rpm samba-swat-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm samba-winbind-devel-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm
ppc64: libsmbclient-devel-3.5.10-115.el6_2.ppc.rpm libsmbclient-devel-3.5.10-115.el6_2.ppc64.rpm samba-debuginfo-3.5.10-115.el6_2.ppc.rpm samba-debuginfo-3.5.10-115.el6_2.ppc64.rpm samba-doc-3.5.10-115.el6_2.ppc64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.ppc64.rpm samba-swat-3.5.10-115.el6_2.ppc64.rpm samba-winbind-devel-3.5.10-115.el6_2.ppc.rpm samba-winbind-devel-3.5.10-115.el6_2.ppc64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.ppc64.rpm
s390x: libsmbclient-devel-3.5.10-115.el6_2.s390.rpm libsmbclient-devel-3.5.10-115.el6_2.s390x.rpm samba-debuginfo-3.5.10-115.el6_2.s390.rpm samba-debuginfo-3.5.10-115.el6_2.s390x.rpm samba-doc-3.5.10-115.el6_2.s390x.rpm samba-domainjoin-gui-3.5.10-115.el6_2.s390x.rpm samba-swat-3.5.10-115.el6_2.s390x.rpm samba-winbind-devel-3.5.10-115.el6_2.s390.rpm samba-winbind-devel-3.5.10-115.el6_2.s390x.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.s390x.rpm
x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm
x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm
i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm
x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-1182.html https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPhKMWXlSAg2UNWIIRAk8XAKCPxrS7IDoIlqr0tNZZiZEE3bCLIwCfZ0DY qQZ8Iim8i5o7EbExdP7Kkjc= =Q/7p -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
The openchange packages provide libraries to access Microsoft Exchange servers using native protocols. Evolution-MAPI uses these libraries to integrate the Evolution PIM application with Microsoft Exchange servers. With this update, the code has been generated with an updated version of PIDL to correct this issue. (BZ#767672, BZ#767678)
This update also fixes the following bugs:
-
When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution-data-server no longer crashes in the described scenario. (BZ#680061)
-
Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1423-1 April 13, 2012
samba vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Samba could be made to run programs as the administrator if it received specially crafted network traffic.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. (CVE-2012-1182)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: samba 2:3.5.11~dfsg-1ubuntu2.2
Ubuntu 11.04: samba 2:3.5.8~dfsg-1ubuntu2.4
Ubuntu 10.04 LTS: samba 2:3.4.7~dfsg-1ubuntu3.9
Ubuntu 8.04 LTS: samba 3.0.28a-1ubuntu4.18
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03365218
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03365218 Version: 3
HPSBUX02789 SSRT100824 rev.3 - HP-UX CIFS Server (Samba), Remote Execution of Arbitrary Code, Elevation of Privileges
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-06-13 Last Updated: 2012-07-23
Potential Security Impact: Remote execution of arbitrary code, elevation of privileges
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX CIFS-Server (Samba).
References: CVE-2012-1182, CVE-2012-2111
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX CIFS-Server (Samba) A.03.01.04 or earlier HP-UX B.11.11, B.11.23, B.11.31 running HP-UX CIFS-Server (Samba) A.02.04.06 or earlier HP-UX B.11.11 running HP-UX CIFS-Server (Samba) A.02.03.06 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-1182 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-2111 (AV:N/AC:L/Au:S/C:P/I:P/A:P) 6.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerabilities. All updates are available for download from http://software.hp.com
HP-UX CIFS-Server (Samba) / HP-UX Release / Samba Depot name
A.03.01.05 11i v2 / B8725AA_A.03.01.05_HP-UX_B.11.23_IA_PA.depot
11i v3 / CIFS-SERVER_A.03.01.05_HP-UX_B.11.31_IA_PA.depot
A.02.04.06 11i v1 / HP-UX_11.11_B8725AA_A.02.04.06_HP-UX_B.11.11_32_64.depot
11i v2 / HP-UX_11.23_B8725AA_A.02.04.06_HP-UX_B.11.23_IA_PA.depot
11i v3 / HP-UX_11.31_CIFS-SERVER_A.02.04.06_HP-UX_B.11.31_IA_PA.depot
A.02.03.06 11i v1 / HP-UX_11.11_B8725AA_A.02.03.06_HP-UX_B.11.11_32_64.depot
MANUAL ACTIONS: Yes - Update Install HP-UX CIFS-Server (Samba) A.03.01.05 or subsequent Install HP-UX CIFS-Server (Samba) A.02.04.06 or subsequent Install HP-UX CIFS-Server (Samba) A.02.03.06 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.23 HP-UX B.11.31 ================== CIFS-Development.CIFS-PRG CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.03.01.05 or subsequent
HP-UX B.11.11 HP-UX B.11.23 ================== CIFS-Development.CIFS-PRG CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-MAN CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.02.04.06 or subsequent
HP-UX B.11.31
CIFS-CFSM.CFSM-KRN CIFS-CFSM.CFSM-MAN CIFS-CFSM.CFSM-RUN CIFS-Development.CIFS-PRG CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-MAN CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.02.04.06 or subsequent
HP-UX B.11.11
CIFS-Development.CIFS-PRG CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-MAN CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.02.03.06 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 13 June 2012 Initial release Version:2 (rev.2) - 25 June 2012 Corrected table heading typo Version:3 (rev.3) - 23 July 2012 Added earlier product versions
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0112", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "3.6.x", "scope": null, "trust": 5.6, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.0" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.1" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.2" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.3" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.4" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.5" }, { "model": "samba", "scope": "eq", "trust": 2.0, "vendor": "samba", "version": "3.0.6" }, { "model": "samba", "scope": "eq", "trust": 1.7, "vendor": "samba", "version": "3.0.2a" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.7" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.8" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.9" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.10" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.11" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.12" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.13" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.14" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.15" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.16" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.17" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.18" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.19" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.20" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.21" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.22" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.23" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.24" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.25" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.26" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.27" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.28" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.29" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.30" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.31" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.32" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.33" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.34" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.35" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.36" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.0.37" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.1" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.2" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.3" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.4" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.5" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.6" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.7" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.8" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.9" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.10" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.11" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.12" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.13" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.14" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.2.15" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.1" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.2" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.3" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.4" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.5" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.6" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.7" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.8" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.9" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.10" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.11" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.12" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.13" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.14" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.15" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.3.16" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.1" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.2" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.3" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.4" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.5" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.6" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.7" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.8" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.9" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.10" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.11" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.12" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.13" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.4.14" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.1" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.2" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.3" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.4" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.5" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.6" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.7" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.8" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.9" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.10" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.5.11" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.6.1" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.6.2" }, { "model": "samba", "scope": "eq", "trust": 1.4, "vendor": "samba", "version": "3.6.3" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.14a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.20a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.20b" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.21a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.21b" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.21c" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.23a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.23b" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.23c" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.23d" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.25a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.25b" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.25c" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.0.26a" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.1.0" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.2.0" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.3.0" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.4.0" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.5.0" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.5.12" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.5.13" }, { "model": "samba", "scope": "eq", "trust": 1.1, "vendor": "samba", "version": "3.6.0" }, { "model": "samba", "scope": "lte", "trust": 1.0, "vendor": "samba", "version": "3.4.15" }, { "model": "c", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "a", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "b", "scope": "eq", "trust": 0.6, "vendor": "samba", "version": "3.0.25" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "hat enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5.3" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.0" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "3.0.23a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "3.0.27a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.5" }, { "model": "pre1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "hat enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "storwize unified", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.1.0" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.2" }, { "model": "3.0.20b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.3" }, { "model": "pre2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "3.0.21b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "3.0.21c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "hat enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "3.0.21a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.8.4985" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "collax", "version": "5.5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "rc3", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.5.2304" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.7.2942" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.8.6067" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.2" }, { "model": "c", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.7.3312" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "3.0.23b", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "hat enterprise linux server optional 6.0.z", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "3.0.20a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.20" }, { "model": "d", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.5" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux enterprise server gplv3 extras", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "scale out network attached storage", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.5" }, { "model": "c", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "solaris 10 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.5.2342" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.28" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "linux enterprise sdk sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.20" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.26" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0" }, { "model": "rc2", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "hat enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6.0" }, { "model": "-r1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.4" }, { "model": "3.0.14a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.4" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.5.14" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "3.0.23d", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "scale out network attached storage", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "1.0.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12.1" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.14" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.25" }, { "model": "hat enterprise linux server eus 6.1.z", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "linux enterprise server for vmware sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.27" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "3.0.26a", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.6.4" }, { "model": "core", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "samba", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.4.16" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.4" }, { "model": "in motion blackberry playbook tablet software", "scope": "eq", "trust": 0.3, "vendor": "research", "version": "2.0.0.7971" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "3.0.23c", "scope": null, "trust": 0.3, "vendor": "samba", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "business server", "scope": "ne", "trust": 0.3, "vendor": "collax", "version": "5.5.2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "solaris 9 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.21" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "3.0.23" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "suse core for", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9x86" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "samba", "scope": "eq", "trust": 0.1, "vendor": "samba", "version": "3.4.15" } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "BID", "id": "52973" }, { "db": "CNNVD", "id": "CNNVD-201204-130" }, { "db": "NVD", "id": "CVE-2012-1182" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1182" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anonymous", "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" } ], "trust": 5.6 }, "cve": "CVE-2012-1182", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-1182", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 5.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "CVE-2012-1182", "trust": 5.6, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1182", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201204-130", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2012-1182", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "CNNVD", "id": "CNNVD-201204-130" }, { "db": "NVD", "id": "CVE-2012-1182" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way Samba handles GetAliasMembership requests. When parsing the data send in the request Samba uses the field \u0027sids\u0027 to create a heap allocation but then uses another field, \u0027num_sids\u0027, to write data to the allocation. Because there is no check to see if \u0027num_sids\u0027 is smaller than \u0027sids\u0027 this could result in a heap buffer overflow that could lead to remote code execution. By sending a specially crafted packet, it is possible to cause Samba to use a different size for memory allocation than it uses for a memory copy loop. Samba is prone to a remote-code-execution vulnerability. Failed exploit attempts will cause a denial-of-service condition. \nSamba versions 3.0 through 3.6.3 are vulnerable. (CVE-2012-1182)\n\nThe samba4 packages have been upgraded to upstream version 4.0.0, which\nprovides a number of bug fixes and enhancements over the previous version. \nIn particular, improved interoperability with Active Directory (AD)\ndomains. SSSD now uses the libndr-krb5pac library to parse the Privilege\nAttribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). \n\nThe Cross Realm Kerberos Trust functionality provided by Identity\nManagement, which relies on the capabilities of the samba4 client library,\nis included as a Technology Preview. This functionality and server\nlibraries, is included as a Technology Preview. This functionality uses the\nlibndr-nbt library to prepare Connection-less Lightweight Directory Access\nProtocol (CLDAP) messages. \n\nAdditionally, various improvements have been made to the Local Security\nAuthority (LSA) and Net Logon services to allow verification of trust\nfrom a Windows system. Because the Cross Realm Kerberos Trust functionality\nis considered a Technology Preview, selected samba4 components are\nconsidered to be a Technology Preview. For more information on which Samba\npackages are considered a Technology Preview, refer to Table 5.1, \"Samba4\nPackage Support\" in the Release Notes, linked to from the References. \n(BZ#766333, BZ#882188)\n\nThis update also fixes the following bug:\n\n* Prior to this update, if the Active Directory (AD) server was rebooted,\nWinbind sometimes failed to reconnect when requested by \"wbinfo -n\" or\n\"wbinfo -s\" commands. Consequently, looking up users using the wbinfo tool\nfailed. This update applies upstream patches to fix this problem and now\nlooking up a Security Identifier (SID) for a username, or a username for a\ngiven SID, works as expected after a domain controller is rebooted. \n867854 - auth_builtin auth_domain auth_sam and auth_winbind are built as shared modules. \n868248 - samba-winbind package wants /var/log/samba\n868419 - samba4 smb and winbind init scripts missing export KRB5CCNAME\n877085 - Wrong sysconfig filename\n878564 - IPA trust cannot always lookup AD users with wbinfo\n882188 - samba4-libs: yyin symbol collision\n885089 - Samba netlogon AES support incorrect\n886157 - samba4 should use the same winbind pipes as samba\n895718 - Incomplete rpm provides filters causes issues with the samba4-libs package on certain architectures\n\n6. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nSamba RPC Network Data Representation Marshalling Vulnerability\n\nSECUNIA ADVISORY ID:\nSA48742\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48742/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48742\n\nRELEASE DATE:\n2012-04-11\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48742/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48742/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48742\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Samba, which can be exploited by\nmalicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an error within the Network Data\nRepresentation (NDR) marshalling functionality when marshalling RPC\ncalls and can be exploited via a specially crafted remote procedure\ncall. \n\nThe vulnerability is reported in versions prior to 3.0.37, 3.2.15,\n3.3.16, 3.4.15, 3.5.13, and 3.6.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Brian Gorenc and an anonymous person via ZDI. \n\nORIGINAL ADVISORY:\nhttp://www.samba.org/samba/security/CVE-2012-1182\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: samba security update\nAdvisory ID: RHSA-2012:0465-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0465.html\nIssue date: 2012-04-10\nCVE Names: CVE-2012-1182 \n=====================================================================\n\n1. Summary:\n\nUpdated samba packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life;\nand Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.0) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.1) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6.0.z) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB) or\nCommon Internet File System (CIFS) protocol, which allows PC-compatible\nmachines to share files, printers, and other information. \n\nA flaw in the Samba suite\u0027s Perl-based DCE/RPC IDL (PIDL) compiler, used\nto generate code to handle RPC calls, resulted in multiple buffer overflows\nin Samba. \n(CVE-2012-1182)\n\nUsers of Samba are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing this\nupdate, the smb service will be restarted automatically. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n804093 - CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.39.el5_8.i386.rpm\nsamba-3.0.33-3.39.el5_8.i386.rpm\nsamba-client-3.0.33-3.39.el5_8.i386.rpm\nsamba-common-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\nsamba-swat-3.0.33-3.39.el5_8.i386.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.39.el5_8.i386.rpm\nlibsmbclient-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-client-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-common-3.0.33-3.39.el5_8.i386.rpm\nsamba-common-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-swat-3.0.33-3.39.el5_8.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm\n\ni386:\nlibsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\n\nx86_64:\nlibsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux Long Life (v. 5.3 server):\n\nSource:\nsamba-3.0.33-3.7.el5_3.5.src.rpm\n\ni386:\nsamba-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-client-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-common-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-swat-3.0.33-3.7.el5_3.5.i386.rpm\n\nia64:\nsamba-3.0.33-3.7.el5_3.5.ia64.rpm\nsamba-client-3.0.33-3.7.el5_3.5.ia64.rpm\nsamba-common-3.0.33-3.7.el5_3.5.ia64.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.5.ia64.rpm\nsamba-swat-3.0.33-3.7.el5_3.5.ia64.rpm\n\nx86_64:\nsamba-3.0.33-3.7.el5_3.5.x86_64.rpm\nsamba-client-3.0.33-3.7.el5_3.5.x86_64.rpm\nsamba-common-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-common-3.0.33-3.7.el5_3.5.x86_64.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm\nsamba-debuginfo-3.0.33-3.7.el5_3.5.x86_64.rpm\nsamba-swat-3.0.33-3.7.el5_3.5.x86_64.rpm\n\nRed Hat Enterprise Linux EUS (v. 5.6 server):\n\nSource:\nsamba-3.0.33-3.29.el5_6.5.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.29.el5_6.5.i386.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-client-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-common-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-swat-3.0.33-3.29.el5_6.5.i386.rpm\n\nia64:\nlibsmbclient-3.0.33-3.29.el5_6.5.ia64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.ia64.rpm\nsamba-3.0.33-3.29.el5_6.5.ia64.rpm\nsamba-client-3.0.33-3.29.el5_6.5.ia64.rpm\nsamba-common-3.0.33-3.29.el5_6.5.ia64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.ia64.rpm\nsamba-swat-3.0.33-3.29.el5_6.5.ia64.rpm\n\nppc:\nlibsmbclient-3.0.33-3.29.el5_6.5.ppc.rpm\nlibsmbclient-3.0.33-3.29.el5_6.5.ppc64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.ppc.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.ppc64.rpm\nsamba-3.0.33-3.29.el5_6.5.ppc.rpm\nsamba-client-3.0.33-3.29.el5_6.5.ppc.rpm\nsamba-common-3.0.33-3.29.el5_6.5.ppc.rpm\nsamba-common-3.0.33-3.29.el5_6.5.ppc64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.ppc.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.ppc64.rpm\nsamba-swat-3.0.33-3.29.el5_6.5.ppc.rpm\n\ns390x:\nlibsmbclient-3.0.33-3.29.el5_6.5.s390.rpm\nlibsmbclient-3.0.33-3.29.el5_6.5.s390x.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.s390.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.s390x.rpm\nsamba-3.0.33-3.29.el5_6.5.s390x.rpm\nsamba-client-3.0.33-3.29.el5_6.5.s390x.rpm\nsamba-common-3.0.33-3.29.el5_6.5.s390.rpm\nsamba-common-3.0.33-3.29.el5_6.5.s390x.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.s390.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.s390x.rpm\nsamba-swat-3.0.33-3.29.el5_6.5.s390x.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.29.el5_6.5.i386.rpm\nlibsmbclient-3.0.33-3.29.el5_6.5.x86_64.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm\nlibsmbclient-devel-3.0.33-3.29.el5_6.5.x86_64.rpm\nsamba-3.0.33-3.29.el5_6.5.x86_64.rpm\nsamba-client-3.0.33-3.29.el5_6.5.x86_64.rpm\nsamba-common-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-common-3.0.33-3.29.el5_6.5.x86_64.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm\nsamba-debuginfo-3.0.33-3.29.el5_6.5.x86_64.rpm\nsamba-swat-3.0.33-3.29.el5_6.5.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm\n\ni386:\nlibsmbclient-3.0.33-3.39.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm\nsamba-3.0.33-3.39.el5_8.i386.rpm\nsamba-client-3.0.33-3.39.el5_8.i386.rpm\nsamba-common-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\nsamba-swat-3.0.33-3.39.el5_8.i386.rpm\n\nia64:\nlibsmbclient-3.0.33-3.39.el5_8.ia64.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.ia64.rpm\nsamba-3.0.33-3.39.el5_8.ia64.rpm\nsamba-client-3.0.33-3.39.el5_8.ia64.rpm\nsamba-common-3.0.33-3.39.el5_8.ia64.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.ia64.rpm\nsamba-swat-3.0.33-3.39.el5_8.ia64.rpm\n\nppc:\nlibsmbclient-3.0.33-3.39.el5_8.ppc.rpm\nlibsmbclient-3.0.33-3.39.el5_8.ppc64.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.ppc.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.ppc64.rpm\nsamba-3.0.33-3.39.el5_8.ppc.rpm\nsamba-client-3.0.33-3.39.el5_8.ppc.rpm\nsamba-common-3.0.33-3.39.el5_8.ppc.rpm\nsamba-common-3.0.33-3.39.el5_8.ppc64.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.ppc.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.ppc64.rpm\nsamba-swat-3.0.33-3.39.el5_8.ppc.rpm\n\ns390x:\nlibsmbclient-3.0.33-3.39.el5_8.s390.rpm\nlibsmbclient-3.0.33-3.39.el5_8.s390x.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.s390.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.s390x.rpm\nsamba-3.0.33-3.39.el5_8.s390x.rpm\nsamba-client-3.0.33-3.39.el5_8.s390x.rpm\nsamba-common-3.0.33-3.39.el5_8.s390.rpm\nsamba-common-3.0.33-3.39.el5_8.s390x.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.s390.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.s390x.rpm\nsamba-swat-3.0.33-3.39.el5_8.s390x.rpm\n\nx86_64:\nlibsmbclient-3.0.33-3.39.el5_8.i386.rpm\nlibsmbclient-3.0.33-3.39.el5_8.x86_64.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm\nlibsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-client-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-common-3.0.33-3.39.el5_8.i386.rpm\nsamba-common-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.i386.rpm\nsamba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm\nsamba-swat-3.0.33-3.39.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nsamba-client-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\n\nx86_64:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-3.5.10-115.el6_2.x86_64.rpm\nsamba-client-3.5.10-115.el6_2.x86_64.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nsamba-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-doc-3.5.10-115.el6_2.i686.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm\nsamba-swat-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm\n\nx86_64:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-doc-3.5.10-115.el6_2.x86_64.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm\nsamba-swat-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\nx86_64:\nsamba-client-3.5.10-115.el6_2.x86_64.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\nx86_64:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-3.5.10-115.el6_2.x86_64.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-doc-3.5.10-115.el6_2.x86_64.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm\nsamba-swat-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.0):\n\nSource:\nsamba-3.5.4-68.el6_0.3.src.rpm\n\ni386:\nlibsmbclient-3.5.4-68.el6_0.3.i686.rpm\nsamba-3.5.4-68.el6_0.3.i686.rpm\nsamba-client-3.5.4-68.el6_0.3.i686.rpm\nsamba-common-3.5.4-68.el6_0.3.i686.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.i686.rpm\nsamba-winbind-3.5.4-68.el6_0.3.i686.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm\n\nppc64:\nlibsmbclient-3.5.4-68.el6_0.3.ppc.rpm\nlibsmbclient-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-client-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-common-3.5.4-68.el6_0.3.ppc.rpm\nsamba-common-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-winbind-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.ppc.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.ppc64.rpm\n\ns390x:\nlibsmbclient-3.5.4-68.el6_0.3.s390.rpm\nlibsmbclient-3.5.4-68.el6_0.3.s390x.rpm\nsamba-3.5.4-68.el6_0.3.s390x.rpm\nsamba-client-3.5.4-68.el6_0.3.s390x.rpm\nsamba-common-3.5.4-68.el6_0.3.s390.rpm\nsamba-common-3.5.4-68.el6_0.3.s390x.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.s390.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm\nsamba-winbind-3.5.4-68.el6_0.3.s390x.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.s390.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.s390x.rpm\n\nx86_64:\nlibsmbclient-3.5.4-68.el6_0.3.i686.rpm\nlibsmbclient-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-client-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-common-3.5.4-68.el6_0.3.i686.rpm\nsamba-common-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.i686.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-winbind-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm\nsamba-winbind-clients-3.5.4-68.el6_0.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.1):\n\nSource:\nsamba-3.5.6-86.el6_1.5.src.rpm\n\ni386:\nlibsmbclient-3.5.6-86.el6_1.5.i686.rpm\nsamba-3.5.6-86.el6_1.5.i686.rpm\nsamba-client-3.5.6-86.el6_1.5.i686.rpm\nsamba-common-3.5.6-86.el6_1.5.i686.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm\n\nppc64:\nlibsmbclient-3.5.6-86.el6_1.5.ppc.rpm\nlibsmbclient-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-client-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-common-3.5.6-86.el6_1.5.ppc.rpm\nsamba-common-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-winbind-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.ppc.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.ppc64.rpm\n\ns390x:\nlibsmbclient-3.5.6-86.el6_1.5.s390.rpm\nlibsmbclient-3.5.6-86.el6_1.5.s390x.rpm\nsamba-3.5.6-86.el6_1.5.s390x.rpm\nsamba-client-3.5.6-86.el6_1.5.s390x.rpm\nsamba-common-3.5.6-86.el6_1.5.s390.rpm\nsamba-common-3.5.6-86.el6_1.5.s390x.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.s390.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm\nsamba-winbind-3.5.6-86.el6_1.5.s390x.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.s390.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.s390x.rpm\n\nx86_64:\nlibsmbclient-3.5.6-86.el6_1.5.i686.rpm\nlibsmbclient-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-client-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-common-3.5.6-86.el6_1.5.i686.rpm\nsamba-common-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.i686.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-winbind-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-clients-3.5.6-86.el6_1.5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nsamba-3.5.10-115.el6_2.i686.rpm\nsamba-client-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\n\nppc64:\nlibsmbclient-3.5.10-115.el6_2.ppc.rpm\nlibsmbclient-3.5.10-115.el6_2.ppc64.rpm\nsamba-3.5.10-115.el6_2.ppc64.rpm\nsamba-client-3.5.10-115.el6_2.ppc64.rpm\nsamba-common-3.5.10-115.el6_2.ppc.rpm\nsamba-common-3.5.10-115.el6_2.ppc64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.ppc.rpm\nsamba-debuginfo-3.5.10-115.el6_2.ppc64.rpm\nsamba-winbind-3.5.10-115.el6_2.ppc64.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.ppc.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.ppc64.rpm\n\ns390x:\nlibsmbclient-3.5.10-115.el6_2.s390.rpm\nlibsmbclient-3.5.10-115.el6_2.s390x.rpm\nsamba-3.5.10-115.el6_2.s390x.rpm\nsamba-client-3.5.10-115.el6_2.s390x.rpm\nsamba-common-3.5.10-115.el6_2.s390.rpm\nsamba-common-3.5.10-115.el6_2.s390x.rpm\nsamba-debuginfo-3.5.10-115.el6_2.s390.rpm\nsamba-debuginfo-3.5.10-115.el6_2.s390x.rpm\nsamba-winbind-3.5.10-115.el6_2.s390x.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.s390.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.s390x.rpm\n\nx86_64:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-3.5.10-115.el6_2.x86_64.rpm\nsamba-3.5.10-115.el6_2.x86_64.rpm\nsamba-client-3.5.10-115.el6_2.x86_64.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6.0.z):\n\nSource:\nsamba-3.5.4-68.el6_0.3.src.rpm\n\ni386:\nlibsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.i686.rpm\nsamba-doc-3.5.4-68.el6_0.3.i686.rpm\nsamba-domainjoin-gui-3.5.4-68.el6_0.3.i686.rpm\nsamba-swat-3.5.4-68.el6_0.3.i686.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm\n\nppc64:\nlibsmbclient-devel-3.5.4-68.el6_0.3.ppc.rpm\nlibsmbclient-devel-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-doc-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-domainjoin-gui-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-swat-3.5.4-68.el6_0.3.ppc64.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.ppc.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.ppc64.rpm\n\ns390x:\nlibsmbclient-devel-3.5.4-68.el6_0.3.s390.rpm\nlibsmbclient-devel-3.5.4-68.el6_0.3.s390x.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.s390.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm\nsamba-doc-3.5.4-68.el6_0.3.s390x.rpm\nsamba-domainjoin-gui-3.5.4-68.el6_0.3.s390x.rpm\nsamba-swat-3.5.4-68.el6_0.3.s390x.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.s390.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm\nlibsmbclient-devel-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.i686.rpm\nsamba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-doc-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-domainjoin-gui-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-swat-3.5.4-68.el6_0.3.x86_64.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm\nsamba-winbind-devel-3.5.4-68.el6_0.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nsamba-3.5.6-86.el6_1.5.src.rpm\n\ni386:\nlibsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.i686.rpm\nsamba-doc-3.5.6-86.el6_1.5.i686.rpm\nsamba-domainjoin-gui-3.5.6-86.el6_1.5.i686.rpm\nsamba-swat-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-krb5-locator-3.5.6-86.el6_1.5.i686.rpm\n\nppc64:\nlibsmbclient-devel-3.5.6-86.el6_1.5.ppc.rpm\nlibsmbclient-devel-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-doc-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-domainjoin-gui-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-swat-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.ppc.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.ppc64.rpm\nsamba-winbind-krb5-locator-3.5.6-86.el6_1.5.ppc64.rpm\n\ns390x:\nlibsmbclient-devel-3.5.6-86.el6_1.5.s390.rpm\nlibsmbclient-devel-3.5.6-86.el6_1.5.s390x.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.s390.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm\nsamba-doc-3.5.6-86.el6_1.5.s390x.rpm\nsamba-domainjoin-gui-3.5.6-86.el6_1.5.s390x.rpm\nsamba-swat-3.5.6-86.el6_1.5.s390x.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.s390.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.s390x.rpm\nsamba-winbind-krb5-locator-3.5.6-86.el6_1.5.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm\nlibsmbclient-devel-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.i686.rpm\nsamba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-doc-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-domainjoin-gui-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-swat-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm\nsamba-winbind-devel-3.5.6-86.el6_1.5.x86_64.rpm\nsamba-winbind-krb5-locator-3.5.6-86.el6_1.5.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-doc-3.5.10-115.el6_2.i686.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm\nsamba-swat-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm\n\nppc64:\nlibsmbclient-devel-3.5.10-115.el6_2.ppc.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.ppc64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.ppc.rpm\nsamba-debuginfo-3.5.10-115.el6_2.ppc64.rpm\nsamba-doc-3.5.10-115.el6_2.ppc64.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.ppc64.rpm\nsamba-swat-3.5.10-115.el6_2.ppc64.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.ppc.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.ppc64.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.ppc64.rpm\n\ns390x:\nlibsmbclient-devel-3.5.10-115.el6_2.s390.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.s390x.rpm\nsamba-debuginfo-3.5.10-115.el6_2.s390.rpm\nsamba-debuginfo-3.5.10-115.el6_2.s390x.rpm\nsamba-doc-3.5.10-115.el6_2.s390x.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.s390x.rpm\nsamba-swat-3.5.10-115.el6_2.s390x.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.s390.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.s390x.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-doc-3.5.10-115.el6_2.x86_64.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm\nsamba-swat-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nsamba-3.5.10-115.el6_2.i686.rpm\nsamba-client-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\n\nx86_64:\nlibsmbclient-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-3.5.10-115.el6_2.x86_64.rpm\nsamba-3.5.10-115.el6_2.x86_64.rpm\nsamba-client-3.5.10-115.el6_2.x86_64.rpm\nsamba-common-3.5.10-115.el6_2.i686.rpm\nsamba-common-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm\n\ni386:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-doc-3.5.10-115.el6_2.i686.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm\nsamba-swat-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm\n\nx86_64:\nlibsmbclient-devel-3.5.10-115.el6_2.i686.rpm\nlibsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-debuginfo-3.5.10-115.el6_2.i686.rpm\nsamba-debuginfo-3.5.10-115.el6_2.x86_64.rpm\nsamba-doc-3.5.10-115.el6_2.x86_64.rpm\nsamba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm\nsamba-swat-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.i686.rpm\nsamba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm\nsamba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-1182.html\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFPhKMWXlSAg2UNWIIRAk8XAKCPxrS7IDoIlqr0tNZZiZEE3bCLIwCfZ0DY\nqQZ8Iim8i5o7EbExdP7Kkjc=\n=Q/7p\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nThe openchange packages provide libraries to access Microsoft Exchange\nservers using native protocols. Evolution-MAPI uses these libraries to\nintegrate the Evolution PIM application with Microsoft Exchange servers. With\nthis update, the code has been generated with an updated version of PIDL to\ncorrect this issue. \n(BZ#767672, BZ#767678)\n\nThis update also fixes the following bugs:\n\n* When the user tried to modify a meeting with one required attendee and\nhimself as the organizer, a segmentation fault occurred in the memcpy()\nfunction. Consequently, the evolution-data-server application terminated\nunexpectedly with a segmentation fault. This bug has been fixed and\nevolution-data-server no longer crashes in the described scenario. \n(BZ#680061)\n\n* Prior to this update, OpenChange 1.0 was unable to send messages with\na large message body or with extensive attachment. This was caused by minor\nissues in OpenChange\u0027s exchange.idl definitions. This bug has been fixed\nand OpenChange now sends extensive messages without complications. Content-Disposition: inline\n\n==========================================================================Ubuntu Security Notice USN-1423-1\nApril 13, 2012\n\nsamba vulnerability\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n\nSummary:\n\nSamba could be made to run programs as the administrator if it received\nspecially crafted network traffic. \n\nSoftware Description:\n- samba: SMB/CIFS file, print, and login server for Unix\n\nDetails:\n\nBrian Gorenc discovered that Samba incorrectly calculated array bounds when\nhandling remote procedure calls (RPC) over the network. (CVE-2012-1182)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.10:\n samba 2:3.5.11~dfsg-1ubuntu2.2\n\nUbuntu 11.04:\n samba 2:3.5.8~dfsg-1ubuntu2.4\n\nUbuntu 10.04 LTS:\n samba 2:3.4.7~dfsg-1ubuntu3.9\n\nUbuntu 8.04 LTS:\n samba 3.0.28a-1ubuntu4.18\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03365218\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03365218\nVersion: 3\n\nHPSBUX02789 SSRT100824 rev.3 - HP-UX CIFS Server (Samba), Remote Execution of\nArbitrary Code, Elevation of Privileges\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-06-13\nLast Updated: 2012-07-23\n\n- -----------------------------------------------------------------------------\n\nPotential Security Impact: Remote execution of arbitrary code, elevation of\nprivileges\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX\nCIFS-Server (Samba). \n\nReferences: CVE-2012-1182, CVE-2012-2111\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.23, B.11.31 running HP-UX CIFS-Server (Samba) A.03.01.04 or\nearlier\nHP-UX B.11.11, B.11.23, B.11.31 running HP-UX CIFS-Server (Samba) A.02.04.06\nor earlier\nHP-UX B.11.11 running HP-UX CIFS-Server (Samba) A.02.03.06 or earlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-1182 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-2111 (AV:N/AC:L/Au:S/C:P/I:P/A:P) 6.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve the\nvulnerabilities. \nAll updates are available for download from http://software.hp.com\n\nHP-UX CIFS-Server (Samba) / HP-UX Release / Samba Depot name\n\nA.03.01.05\n11i v2 / B8725AA_A.03.01.05_HP-UX_B.11.23_IA_PA.depot\n\n11i v3 / CIFS-SERVER_A.03.01.05_HP-UX_B.11.31_IA_PA.depot\n\nA.02.04.06\n11i v1 / HP-UX_11.11_B8725AA_A.02.04.06_HP-UX_B.11.11_32_64.depot\n\n11i v2 / HP-UX_11.23_B8725AA_A.02.04.06_HP-UX_B.11.23_IA_PA.depot\n\n11i v3 / HP-UX_11.31_CIFS-SERVER_A.02.04.06_HP-UX_B.11.31_IA_PA.depot\n\nA.02.03.06\n11i v1 / HP-UX_11.11_B8725AA_A.02.03.06_HP-UX_B.11.11_32_64.depot\n\nMANUAL ACTIONS: Yes - Update\nInstall HP-UX CIFS-Server (Samba) A.03.01.05 or subsequent\nInstall HP-UX CIFS-Server (Samba) A.02.04.06 or subsequent\nInstall HP-UX CIFS-Server (Samba) A.02.03.06 or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.23\nHP-UX B.11.31\n==================\nCIFS-Development.CIFS-PRG\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.03.01.05 or subsequent\n\nHP-UX B.11.11\nHP-UX B.11.23\n==================\nCIFS-Development.CIFS-PRG\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-MAN\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.02.04.06 or subsequent\n\nHP-UX B.11.31\n==================\nCIFS-CFSM.CFSM-KRN\nCIFS-CFSM.CFSM-MAN\nCIFS-CFSM.CFSM-RUN\nCIFS-Development.CIFS-PRG\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-MAN\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.02.04.06 or subsequent\n\nHP-UX B.11.11\n==================\nCIFS-Development.CIFS-PRG\nCIFS-Server.CIFS-ADMIN\nCIFS-Server.CIFS-DOC\nCIFS-Server.CIFS-LIB\nCIFS-Server.CIFS-MAN\nCIFS-Server.CIFS-RUN\nCIFS-Server.CIFS-UTIL\naction: install revision A.02.03.06 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 13 June 2012 Initial release\nVersion:2 (rev.2) - 25 June 2012 Corrected table heading typo\nVersion:3 (rev.3) - 23 July 2012 Added earlier product versions\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2012-1182" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "BID", "id": "52973" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "PACKETSTORM", "id": "120435" }, { "db": "PACKETSTORM", "id": "111776" }, { "db": "PACKETSTORM", "id": "111735" }, { "db": "PACKETSTORM", "id": "120441" }, { "db": "PACKETSTORM", "id": "111737" }, { "db": "PACKETSTORM", "id": "111839" }, { "db": "PACKETSTORM", "id": "115008" } ], "trust": 6.93 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=21850", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1182" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1182", "trust": 8.3 }, { "db": "SECUNIA", "id": "48816", "trust": 1.1 }, { "db": "SECUNIA", "id": "48818", "trust": 1.1 }, { "db": "SECUNIA", "id": "48844", "trust": 1.1 }, { "db": "SECUNIA", "id": "48751", "trust": 1.1 }, { "db": "SECUNIA", "id": "48754", "trust": 1.1 }, { "db": "SECUNIA", "id": "48873", "trust": 1.1 }, { "db": "SECUNIA", "id": "48879", "trust": 1.1 }, { "db": "SECUNIA", "id": "48999", "trust": 1.1 }, { "db": "SECTRACK", "id": "1026913", "trust": 1.1 }, { "db": "ZDI", "id": "ZDI-12-071", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-068", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-062", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-072", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-061", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-070", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-069", "trust": 1.0 }, { "db": "ZDI", "id": "ZDI-12-064", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1505", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1503", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1538", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1530", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1540", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1506", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1504", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1539", "trust": 0.7 }, { "db": "NSFOCUS", "id": "19335", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201204-130", "trust": 0.6 }, { "db": "BID", "id": "52973", "trust": 0.4 }, { "db": "ZDI", "id": "ZDI-12-063", "trust": 0.3 }, { "db": "SECUNIA", "id": "48742", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "21850", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2012-1182", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120435", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111776", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111735", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120441", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111737", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111839", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "115008", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "BID", "id": "52973" }, { "db": "PACKETSTORM", "id": "120435" }, { "db": "PACKETSTORM", "id": "111776" }, { "db": "PACKETSTORM", "id": "111735" }, { "db": "PACKETSTORM", "id": "120441" }, { "db": "PACKETSTORM", "id": "111737" }, { "db": "PACKETSTORM", "id": "111839" }, { "db": "PACKETSTORM", "id": "115008" }, { "db": "CNNVD", "id": "CNNVD-201204-130" }, { "db": "NVD", "id": "CVE-2012-1182" } ] }, "id": "VAR-201204-0112", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.14074074 }, "last_update_date": "2024-07-22T22:34:14.384000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Samba has issued an update to correct this vulnerability.", "trust": 5.6, "url": "http://www.samba.org/samba/security/cve-2012-1182" }, { "title": "samba-3.4.16", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42873" }, { "title": "samba-3.5.14", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42872" }, { "title": "samba-3.6.4", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42871" }, { "title": "Red Hat: Moderate: openchange security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20130515 - security advisory" }, { "title": "Red Hat: Critical: samba security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120465 - security advisory" }, { "title": "Red Hat: Critical: samba3x security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120466 - security advisory" }, { "title": "Red Hat: Critical: samba security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120478 - security advisory" }, { "title": "Red Hat: Moderate: samba4 security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20130506 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: samba: remote code execution (CVE-2012-1182)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=f388f45ecb705c4c60e4f77799d0c220" }, { "title": "Ubuntu Security Notice: samba vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1423-1" }, { "title": "Debian Security Advisories: DSA-2450-1 samba -- privilege escalation", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=71368d3db203816c572e4433d9958611" }, { "title": "Information_Collection_Handbook", "trust": 0.1, "url": "https://github.com/qftm/information_collection_handbook " }, { "title": "RedTeamPlaybook", "trust": 0.1, "url": "https://github.com/esteban0477/redteamplaybook " }, { "title": "code-snippets-bash", "trust": 0.1, "url": "https://github.com/nullmode/code-snippets-bash " }, { "title": "python-nmap", "trust": 0.1, "url": "https://github.com/kaanyeniyol/python-nmap " }, { "title": "OSCP-Prep", "trust": 0.1, "url": "https://github.com/superhero1/oscp-prep " }, { "title": "rt-n56u", "trust": 0.1, "url": "https://github.com/joneswu456/rt-n56u " } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "CNNVD", "id": "CNNVD-201204-130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1182" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 7.7, "url": "https://www.samba.org/samba/security/cve-2012-1182" }, { "trust": 1.4, "url": "http://www.samba.org/samba/history/samba-3.6.4.html" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-1423-1" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078258.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078726.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078836.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-may/080567.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48751" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48754" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48816" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48818" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48844" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48873" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48879" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48999" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht5281" }, { "trust": 1.1, "url": "http://www.collax.com/produkte/allinone-server-for-small-businesses#id2565578" }, { "trust": 1.1, "url": "http://www.debian.org/security/2012/dsa-2450" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:055" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1026913" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1182" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19335" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1182.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.4, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2012-1182" }, { "trust": 0.3, "url": "http://www.collax.com/produkte/die-komplettloesung-fuer-kleine-unternehmen" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03365218\u0026ac.admitted=1339650390917.876444892.492883150" }, { "trust": 0.3, "url": "http://www.samba.org" }, { "trust": 0.3, "url": "http://www-304.ibm.com/support/docview.wss?uid=ssg1s1004108" }, { "trust": 0.3, "url": "http://www-304.ibm.com/support/docview.wss?uid=ssg1s1004109" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100161399" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100161830" }, { "trust": 0.3, "url": "http://www.blackberry.com/btsc/kb32189" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_1182_arbitrary_code" }, { "trust": 0.3, "url": "http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c03366886" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-061" }, { "trust": 0.3, "url": "www.zerodayinitiative.com/advisories/zdi-12-062" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-063" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-064" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-068" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-069" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-070" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-071" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-12-072" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/189.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2013:0515" }, { "trust": 0.1, "url": "https://github.com/qftm/information_collection_handbook" }, { "trust": 0.1, "url": "https://github.com/nullmode/code-snippets-bash" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/21850/" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2012-1182" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/52973" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=25650" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1423-1/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2013-0506.html" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/docs/en-us/red_hat_enterprise_linux/6/html/6.4_release_notes/index.html" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48742" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48742/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48742/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0465.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2013-0515.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0466.html" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:3.5.11~dfsg-1ubuntu2.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:3.5.8~dfsg-1ubuntu2.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/3.0.28a-1ubuntu4.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.9" }, { "trust": 0.1, "url": "http://software.hp.com" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2111" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "BID", "id": "52973" }, { "db": "PACKETSTORM", "id": "120435" }, { "db": "PACKETSTORM", "id": "111776" }, { "db": "PACKETSTORM", "id": "111735" }, { "db": "PACKETSTORM", "id": "120441" }, { "db": "PACKETSTORM", "id": "111737" }, { "db": "PACKETSTORM", "id": "111839" }, { "db": "PACKETSTORM", "id": "115008" }, { "db": "CNNVD", "id": "CNNVD-201204-130" }, { "db": "NVD", "id": "CVE-2012-1182" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-12-071" }, { "db": "ZDI", "id": "ZDI-12-068" }, { "db": "ZDI", "id": "ZDI-12-062" }, { "db": "ZDI", "id": "ZDI-12-072" }, { "db": "ZDI", "id": "ZDI-12-061" }, { "db": "ZDI", "id": "ZDI-12-070" }, { "db": "ZDI", "id": "ZDI-12-069" }, { "db": "ZDI", "id": "ZDI-12-064" }, { "db": "VULMON", "id": "CVE-2012-1182" }, { "db": "BID", "id": "52973" }, { "db": "PACKETSTORM", "id": "120435" }, { "db": "PACKETSTORM", "id": "111776" }, { "db": "PACKETSTORM", "id": "111735" }, { "db": "PACKETSTORM", "id": "120441" }, { "db": "PACKETSTORM", "id": "111737" }, { "db": "PACKETSTORM", "id": "111839" }, { "db": "PACKETSTORM", "id": "115008" }, { "db": "CNNVD", "id": "CNNVD-201204-130" }, { "db": "NVD", "id": "CVE-2012-1182" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-071" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-068" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-062" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-072" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-061" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-070" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-069" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-064" }, { "date": "2012-04-10T00:00:00", "db": "VULMON", "id": "CVE-2012-1182" }, { "date": "2012-04-10T00:00:00", "db": "BID", "id": "52973" }, { "date": "2013-02-21T16:26:26", "db": "PACKETSTORM", "id": "120435" }, { "date": "2012-04-11T07:10:16", "db": "PACKETSTORM", "id": "111776" }, { "date": "2012-04-11T14:20:53", "db": "PACKETSTORM", "id": "111735" }, { "date": "2013-02-21T16:27:45", "db": "PACKETSTORM", "id": "120441" }, { "date": "2012-04-11T14:21:17", "db": "PACKETSTORM", "id": "111737" }, { "date": "2012-04-13T19:37:57", "db": "PACKETSTORM", "id": "111839" }, { "date": "2012-07-25T23:23:00", "db": "PACKETSTORM", "id": "115008" }, { "date": "2012-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-130" }, { "date": "2012-04-10T21:55:02.203000", "db": "NVD", "id": "CVE-2012-1182" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-071" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-068" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-062" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-072" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-061" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-070" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-069" }, { "date": "2012-04-18T00:00:00", "db": "ZDI", "id": "ZDI-12-064" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2012-1182" }, { "date": "2015-04-13T21:38:00", "db": "BID", "id": "52973" }, { "date": "2012-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-130" }, { "date": "2018-10-30T16:25:59.730000", "db": "NVD", "id": "CVE-2012-1182" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "111735" }, { "db": "PACKETSTORM", "id": "111737" }, { "db": "PACKETSTORM", "id": "111839" }, { "db": "CNNVD", "id": "CNNVD-201204-130" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba ndr_ValidatePassword heap overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-12-071" } ], "trust": 0.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201204-130" } ], "trust": 0.6 } }
var-200305-0049
Vulnerability from variot
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Samba contains several buffer overflow vulnerabilitites. Samba contains several buffer overflow vulnerabilitites. An updated version has been released. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Samba 2.2.8 Previously, when dealing with files with very long file names, smbd/trans2.c Inside StrnCpy() There is a problem with buffer overflow in functions. StrnCpy(fname,pname,namelen) Marked StrnCpy() In the function namelen using pstring Type (1024 Byte char Type array ) Variables fname Within pname Copy for that reason, pname In 1024 By giving a value larger than bytes, it is possible to cause a buffer overflow and overwrite the memory area. (CAN-2003-0201) In addition, there are other potential buffer overflow issues that stem from this issue. 3 Have been found by vendors (CAN-2003-0196) , A corrected version for all these issues Samba 2.2.8a Is published. At this time, this problem (CAN-2003-0196) Details of are unknown.Please refer to the “Overview” for the impact of this vulnerability. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory. Samba-TNG 0.3.1 and earlier are also affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200305-0049", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 2.4, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "montavista", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "sgi", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "samba team", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 2.4, "vendor": "sun microsystems", "version": null }, { "model": "tru64", "scope": "eq", "trust": 1.9, "vendor": "compaq", "version": "5.1" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sco", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "samba tng", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sorceror linux", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "trustix", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "wirex", "version": null }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.1_pk5_bl19" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.0f" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.1_pk4_bl18" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.0a" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.0a_pk3_bl17" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.0_pk4_bl18" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.0_pk4_bl17" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.1_pk6_bl20" }, { "model": "tru64", "scope": "eq", "trust": 1.6, "vendor": "compaq", "version": "5.1_pk3_bl17" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.8" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.01" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.04" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.22" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.3" }, { "model": "samba-tng", "scope": "eq", "trust": 1.3, "vendor": "samba tng", "version": "0.3" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.11" }, { "model": "samba-tng", "scope": "eq", "trust": 1.3, "vendor": "samba tng", "version": "0.3.1" }, { "model": "solaris", "scope": "eq", "trust": 1.3, "vendor": "sun", "version": "2.5.1" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.6" }, { "model": "tru64", "scope": "eq", "trust": 1.3, "vendor": "compaq", "version": "5.0" }, { "model": "solaris", "scope": "eq", "trust": 1.3, "vendor": "sun", "version": "2.6" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.20" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.4" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.0" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.7" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.5" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.8" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.9" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.1" }, { "model": "solaris", "scope": "eq", "trust": 1.3, "vendor": "sun", "version": "7.0" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.4" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.10" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.0" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.6" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.0.2" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.7" }, { "model": "samba", "scope": "eq", "trust": 1.3, "vendor": "samba", "version": "2.2.5" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.20" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1a_pk3_bl3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.3" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0f_pk6_bl17" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1a_pk2_bl2" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": null }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.05" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.09.01" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0d_pk9_bl17" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "2.2.0a" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0f_pk7_bl18" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0f" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.00" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1b_pk1_bl1" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.07" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.06" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.8" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "9.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "8.0" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.09" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.5.1" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0d" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.7" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1a_pk1_bl1" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "2.2.3a" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.1" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0g" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1b" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.2" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.08" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "2.2.7a" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.4" }, { "model": "samba", "scope": "eq", "trust": 1.0, "vendor": "samba", "version": "2.2.1a" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.09.02" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "5.1a" }, { "model": "cifs-9000 server", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "a.01.08.01" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0b" }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "compaq", "version": "4.0g_pk3_bl17" }, { "model": "samba", "scope": "lte", "trust": 0.8, "vendor": "samba", "version": "2.2.8" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "1.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "cobalt raq4", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raq550", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "cobalt raqxtr", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.5" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "tru64 pk4", "scope": "eq", "trust": 0.6, "vendor": "compaq", "version": "5.0" }, { "model": "tru64 pk4", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "tru64 f pk6", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "tru64 pk3", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "tru64 f", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.2.1" }, { "model": "cifs/9000 server a.01.08.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cifs/9000 server a.01.09.03", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "solaris x86", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.5.1" }, { "model": "tru64 b", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "alpha", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "tru64 g pk3", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": ".0a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.2" }, { "model": "tru64 d pk9", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "solaris 2.6 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cifs/9000 server a.01.09", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cobalt raq 4100r", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "550" }, { "model": "cifs/9000 server a.01.09.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tru64 d", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "tru64 g", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "tru64 a", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.0" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "a", "scope": "ne", "trust": 0.3, "vendor": "samba", "version": "2.2.8" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "tru64 f pk7", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.2.2" }, { "model": "tru64 pk6", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "cifs/9000 server a.01.08", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cifs/9000 server a.01.07", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cifs/9000 server a.01.09.04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cobalt qube3 4000wg", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cifs/9000 server a.01.09.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tru64 a pk3", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.0" }, { "model": "tru64 a pk1", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "tru64 b pk1", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "cifs/9000 server a.01.06", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tru64 a pk2", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.2.7" }, { "model": "cifs/9000 server a.01.05", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.0" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2" }, { "model": "tru64 a", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "tru64 pk5", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "tru64 f", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "4.0" }, { "model": "tru64 b", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "samba-tng", "scope": "ne", "trust": 0.3, "vendor": "samba tng", "version": "0.3.2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris ppc", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "tru64 a pk3", "scope": "eq", "trust": 0.3, "vendor": "compaq", "version": "5.1" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.2.3" }, { "model": "cobalt raq4 3001r", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cobalt raq xtr 3500r", "scope": null, "trust": 0.3, "vendor": "sun", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "BID", "id": "7294" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba-tng:samba-tng:0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba-tng:samba-tng:0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.09.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.09.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:cifs-9000_server:a.01.08.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0201" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Erik Parker\u203b erik.parker@digitaldefense.net", "sources": [ { "db": "CNNVD", "id": "CNNVD-200305-012" } ], "trust": 0.6 }, "cve": "CVE-2003-0201", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2003-0201", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-7030", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2003-0201", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#267873", "trust": 1.6, "value": "20.48" }, { "author": "CARNEGIE MELLON", "id": "VU#298233", "trust": 0.8, "value": "23.63" }, { "author": "CNNVD", "id": "CNNVD-200305-012", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-7030", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2003-0201", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. Samba contains several buffer overflow vulnerabilitites. Samba contains several buffer overflow vulnerabilitites. An updated version has been released. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Samba 2.2.8 Previously, when dealing with files with very long file names, smbd/trans2.c Inside StrnCpy() There is a problem with buffer overflow in functions. StrnCpy(fname,pname,namelen) Marked StrnCpy() In the function namelen using pstring Type (1024 Byte char Type array ) Variables fname Within pname Copy for that reason, pname In 1024 By giving a value larger than bytes, it is possible to cause a buffer overflow and overwrite the memory area. (CAN-2003-0201) In addition, there are other potential buffer overflow issues that stem from this issue. 3 Have been found by vendors (CAN-2003-0196) , A corrected version for all these issues Samba 2.2.8a Is published. At this time, this problem (CAN-2003-0196) Details of are unknown.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory. Samba-TNG 0.3.1 and earlier are also affected", "sources": [ { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "BID", "id": "7294" }, { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" } ], "trust": 4.23 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=55", "trust": 1.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-7030", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "7294", "trust": 4.5 }, { "db": "NVD", "id": "CVE-2003-0201", "trust": 4.5 }, { "db": "CERT/CC", "id": "VU#267873", "trust": 4.2 }, { "db": "CERT/CC", "id": "VU#298233", "trust": 2.4 }, { "db": "BID", "id": "7106", "trust": 0.8 }, { "db": "BID", "id": "7295", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000113", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20030408 [SORCERER-SPELLS] SAMBA--SORCERER2003-04-08", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030407 IMMUNIX SECURED OS 7+ SAMBA UPDATE", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030409 GLSA: SAMBA (200304-02)", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030407 [DDI-1013] BUFFER OVERFLOW IN SAMBA ALLOWS REMOTE ROOT COMPROMISE", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2003:025", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLA-2003:624", "trust": 0.6 }, { "db": "SGI", "id": "20030403-01-P", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2003:044", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:567", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:2163", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-280", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:137", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200305-012", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-88770", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-88737", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-66978", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-76273", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-88826", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-18016", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-76271", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-70847", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-62711", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71372", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71376", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-76272", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71360", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-76270", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22468", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22469", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "10", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16330", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16861", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22470", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16876", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16880", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22471", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "9924", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "7", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "84541", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "84542", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82311", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-7030", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "55", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2003-0201", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" }, { "db": "BID", "id": "7294" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "id": "VAR-200305-0049", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-7030" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:13:56.501000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBUX00254", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00956530" }, { "title": "HPSBUX0304-254", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0304-254.html" }, { "title": "RHSA-2003:137", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2003-137.html" }, { "title": "samba", "trust": 0.8, "url": "http://www.samba.org/samba/samba.html" }, { "title": "53581", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-53581-1" }, { "title": "53924", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-53924-1" }, { "title": "53581", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-53581-3" }, { "title": "53924", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-53924-3" }, { "title": "TLSA-2003-27", "trust": 0.8, "url": "http://www.turbolinux.com/security/2003/tlsa-2003-27.txt" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.miraclelinux.com/" }, { "title": "RHSA-2003:137", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-137j.html" }, { "title": "TLSA-2003-27", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2003/tlsa-2003-27j.txt" }, { "title": "trans2open-CVE-2003-0201", "trust": 0.1, "url": "https://github.com/kernelpan1k/trans2open-cve-2003-0201 " }, { "title": "Reporte-de-Resultados", "trust": 0.1, "url": "https://github.com/rebekattan/reporte-de-resultados " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/bensongithub/eqgrp " }, { "title": "Tools", "trust": 0.1, "url": "https://github.com/bl4ck4t/tools " }, { "title": "x0rzEQGRP", "trust": 0.1, "url": "https://github.com/happysmack/x0rzeqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/nekkidso/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/391861737/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/muhammd/eqgrp " }, { "title": "ShadowBrokersFiles", "trust": 0.1, "url": "https://github.com/r3k1ng/shadowbrokersfiles " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/ckmaenn/eqgrp " }, { "title": "EQGRP_Linux", "trust": 0.1, "url": "https://github.com/cybernetix-s3c/eqgrp_linux " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/iha114/eqgrp " }, { "title": "ShadowBrokersFiles", "trust": 0.1, "url": "https://github.com/antiscammerarmy/shadowbrokersfiles " }, { "title": "shadowbrokerstuff", "trust": 0.1, "url": "https://github.com/thetrentusdev/shadowbrokerstuff " }, { "title": "test", "trust": 0.1, "url": "https://github.com/devkosov/test " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/hackcrypto/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/ninja-tw1st/eqgrp " }, { "title": "leaked2", "trust": 0.1, "url": "https://github.com/kongjiexi/leaked2 " }, { "title": "bdhglopoj", "trust": 0.1, "url": "https://github.com/maxcvnd/bdhglopoj " }, { "title": "shadowbrokerstuff", "trust": 0.1, "url": "https://github.com/shakenetwork/shadowbrokerstuff " }, { "title": "x0rz-EQGRP", "trust": 0.1, "url": "https://github.com/r3p3r/x0rz-eqgrp " }, { "title": "ShadowBrokersStuff", "trust": 0.1, "url": "https://github.com/thetrentus/shadowbrokersstuff " }, { "title": "EQ1", "trust": 0.1, "url": "https://github.com/thepevertedspartan/eq1 " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/badbug6/eqgrp " }, { "title": "EQGRP-nasa", "trust": 0.1, "url": "https://github.com/soldie/eqgrp-nasa " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/mofty/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/thetrentus/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/namangangwar/eqgrp " }, { "title": "EQGRP", "trust": 0.1, "url": "https://github.com/x0rz/eqgrp " }, { "title": "SB--.-HACK-the-EQGRP-1", "trust": 0.1, "url": "https://github.com/cipherreborn/sb--.-hack-the-eqgrp-1 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2003-0201" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0201" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.2, "url": "http://www.securityfocus.com/bid/7294" }, { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/267873" }, { "trust": 2.1, "url": "http://www.digitaldefense.net/labs/advisories/ddi-1013.txt" }, { "trust": 1.8, "url": "http://www.debian.org/security/2003/dsa-280" }, { "trust": 1.8, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:044" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2003-137.html" }, { "trust": 1.8, "url": "ftp://patches.sgi.com/support/free/security/advisories/20030403-01-p" }, { "trust": 1.8, "url": "http://www.novell.com/linux/security/advisories/2003_025_samba.html" }, { "trust": 1.7, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000624" }, { "trust": 1.6, "url": "http://lists.samba.org/pipermail/samba-announce/2003-april/000065.html" }, { "trust": 1.6, "url": "http://lists.samba.org/pipermail/samba-announce/2003-march/000063.html" }, { "trust": 1.6, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0201" }, { "trust": 1.6, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0196" }, { "trust": 1.6, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0085" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/298233" }, { "trust": 1.6, "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0008.html" }, { "trust": 1.6, "url": "http://www.samba-tng.org/download/tng/announcement-0.3.2.txt" }, { "trust": 1.6, "url": "http://www.samba-tng.org/" }, { "trust": 1.6, "url": "http://www.samba.org/" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2163" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a567" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=104972664226781\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=104974612519064\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=104994564212488\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=104981682014565\u0026w=2" }, { "trust": 0.8, "url": "http://www.samba.org/samba/whatsnew/samba-2.2.8.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/7106" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0201" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0201" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/7295" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104972664226781\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104994564212488\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104981682014565\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104974612519064\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:567" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2163" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://metasploit.com/projects/framework/exploits.html" }, { "trust": 0.3, "url": "http://www.samba.org" }, { "trust": 0.3, "url": "http://support.coresecurity.com/impact/exploits/e3a738fd21350fa2faa7e171b121f0d4.html" }, { "trust": 0.3, "url": "http://www.samba-tng.org" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f53581" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f53924" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/patches/linux/security.html" }, { "trust": 0.3, "url": "http://seer.support.veritas.com/docs/256903.htm" }, { "trust": 0.3, "url": "/archive/1/317758" }, { "trust": 0.3, "url": "/archive/1/317985" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=104974612519064\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=104972664226781\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=104981682014565\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=104994564212488\u0026amp;w=2" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000624" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/kernelpan1k/trans2open-cve-2003-0201" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/55/" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/solaris/samba/trans2open" } ], "sources": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" }, { "db": "BID", "id": "7294" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#298233" }, { "db": "VULHUB", "id": "VHN-7030" }, { "db": "VULMON", "id": "CVE-2003-0201" }, { "db": "BID", "id": "7294" }, { "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "db": "NVD", "id": "CVE-2003-0201" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-04-10T00:00:00", "db": "CERT/CC", "id": "VU#267873" }, { "date": "2003-04-10T00:00:00", "db": "CERT/CC", "id": "VU#267873" }, { "date": "2003-03-17T00:00:00", "db": "CERT/CC", "id": "VU#298233" }, { "date": "2003-05-05T00:00:00", "db": "VULHUB", "id": "VHN-7030" }, { "date": "2003-05-05T00:00:00", "db": "VULMON", "id": "CVE-2003-0201" }, { "date": "2003-04-07T00:00:00", "db": "BID", "id": "7294" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "date": "2003-05-05T04:00:00", "db": "NVD", "id": "CVE-2003-0201" }, { "date": "2003-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-07-10T00:00:00", "db": "CERT/CC", "id": "VU#267873" }, { "date": "2003-07-10T00:00:00", "db": "CERT/CC", "id": "VU#267873" }, { "date": "2003-05-15T00:00:00", "db": "CERT/CC", "id": "VU#298233" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-7030" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2003-0201" }, { "date": "2009-07-11T21:06:00", "db": "BID", "id": "7294" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000113" }, { "date": "2018-10-30T16:26:22.763000", "db": "NVD", "id": "CVE-2003-0201" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200305-012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200305-012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Samba contains multiple buffer overflows", "sources": [ { "db": "CERT/CC", "id": "VU#267873" }, { "db": "CERT/CC", "id": "VU#267873" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "7294" }, { "db": "CNNVD", "id": "CNNVD-200305-012" } ], "trust": 0.9 } }
var-200412-0740
Vulnerability from variot
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks. Xcode is prone to a remote security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0740", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xcode", "scope": "eq", "trust": 1.9, "vendor": "apple", "version": "1.5" }, { "model": "samba", "scope": "lte", "trust": 1.0, "vendor": "samba", "version": "2.18.3" }, { "model": "samba", "scope": "eq", "trust": 0.3, "vendor": "samba", "version": "2.18.3" } ], "sources": [ { "db": "BID", "id": "90317" }, { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:xcode:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-2687" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "90317" } ], "trust": 0.3 }, "cve": "CVE-2004-2687", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-11115", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2004-2687", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-2687", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200412-679", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-11115", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2004-2687", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" }, { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks. Xcode is prone to a remote security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "BID", "id": "90317" }, { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" } ], "trust": 1.35 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-11115", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=9915", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-2687", "trust": 2.1 }, { "db": "OSVDB", "id": "13378", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-200412-679", "trust": 0.7 }, { "db": "BID", "id": "90317", "trust": 0.5 }, { "db": "EXPLOIT-DB", "id": "9915", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "82331", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-18008", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-66970", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-11115", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2004-2687", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" }, { "db": "BID", "id": "90317" }, { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "id": "VAR-200412-0740", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-11115" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:45:27.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SecGen", "trust": 0.1, "url": "https://github.com/secgen/secgen " }, { "title": "Lame-HTB-Writeup-FR", "trust": 0.1, "url": "https://github.com/gwyomarch/lame-htb-writeup-fr " }, { "title": "Intrusion_Detection_System-Python", "trust": 0.1, "url": "https://github.com/marcocastro100/intrusion_detection_system-python " } ], "sources": [ { "db": "VULMON", "id": "CVE-2004-2687" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-16", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "NVD", "id": "CVE-2004-2687" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.5, "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html" }, { "trust": 1.5, "url": "http://distcc.samba.org/security.html" }, { "trust": 1.5, "url": "http://www.metasploit.org/projects/framework/exploits.html#distcc_exec" }, { "trust": 1.5, "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html" }, { "trust": 1.5, "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html" }, { "trust": 1.2, "url": "http://www.osvdb.org/13378" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/distcc-privilege-escalation-via-ip-address-whitelist-28636" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/16.html" }, { "trust": 0.1, "url": "https://github.com/secgen/secgen" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/9915/" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/unix/misc/distcc_exec" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/90317" } ], "sources": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" }, { "db": "BID", "id": "90317" }, { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-11115" }, { "db": "VULMON", "id": "CVE-2004-2687" }, { "db": "BID", "id": "90317" }, { "db": "NVD", "id": "CVE-2004-2687" }, { "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-11115" }, { "date": "2004-12-31T00:00:00", "db": "VULMON", "id": "CVE-2004-2687" }, { "date": "2004-12-31T00:00:00", "db": "BID", "id": "90317" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-2687" }, { "date": "2004-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-11115" }, { "date": "2008-09-05T00:00:00", "db": "VULMON", "id": "CVE-2004-2687" }, { "date": "2004-12-31T00:00:00", "db": "BID", "id": "90317" }, { "date": "2008-09-05T04:00:00", "db": "NVD", "id": "CVE-2004-2687" }, { "date": "2019-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-679" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-679" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Xcode Tools Configuration error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-679" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-679" } ], "trust": 0.6 } }
var-202008-0248
Vulnerability from variot
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications. The Microsoft Windows Netlogon Remote Protocol (MS-NRPC) reuses a known, static, zero-value initialization vector (IV) in AES-CFB8 mode. Both Microsoft Windows and Microsoft Windows Server are products of Microsoft Corporation. Microsoft Windows is an operating system for personal devices. Microsoft Windows Server is a server operating system. Netlogon is a service used to register all SRV resource records for domain controllers. An elevation of privilege vulnerability exists in Microsoft Windows NetLogon. The following products and versions are affected: Microsoft Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 1903, Windows Server 1909, Windows Server 2004. A flaw was found in the way samba handled file and directory permissions. (CVE-2020-14318) A null pointer dereference flaw was found in Samba's winbind service. This flaw allows a local user to crash the winbind service, causing a denial of service. The highest threat from this vulnerability is to system availability. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-1472). 8) - aarch64, noarch, ppc64le, s390x, x86_64
The following packages have been upgraded to a later upstream version: samba (4.13.3).
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202012-24
https://security.gentoo.org/
Severity: Normal Title: Samba: Multiple vulnerabilities Date: December 24, 2020 Bugs: #743433, #751724 ID: 202012-24
Synopsis
Multiple vulnerabilities have been found in Samba, the worst of which could result in a Denial of Service condition.
Background
Samba is a suite of SMB and CIFS client/server programs.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-fs/samba < 4.12.9 >= 4.12.9
Description
Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Samba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-4.12.9"
References
[ 1 ] CVE-2020-14318 https://nvd.nist.gov/vuln/detail/CVE-2020-14318 [ 2 ] CVE-2020-14323 https://nvd.nist.gov/vuln/detail/CVE-2020-14323 [ 3 ] CVE-2020-14383 https://nvd.nist.gov/vuln/detail/CVE-2020-14383 [ 4 ] CVE-2020-1472 https://nvd.nist.gov/vuln/detail/CVE-2020-1472
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202012-24
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: samba security and bug fix update Advisory ID: RHSA-2020:5439-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5439 Issue date: 2020-12-15 CVE Names: CVE-2020-1472 CVE-2020-14318 CVE-2020-14323 =====================================================================
- Summary:
An update for samba is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
-
samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472)
-
samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318)
-
samba: Unprivileged user can crash winbind (CVE-2020-14323)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
The 'require_membership_of' documentation in pam_winbind manpage is incorrect (BZ#1853272)
-
Malfunctioning %U substitution in valid users option (BZ#1868917)
-
Regression: smbd and nmbd are restarted when samba-winbind package is upgraded (BZ#1878205)
-
winbindd memory leak on wbinfo -u with security=ADS (BZ#1892313)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1853272 - The 'require_membership_of' documentation in pam_winbind manpage is incorrect [rhel-7.9.z] 1868917 - Malfunctioning %U substitution in valid users option [rhel-7.9.z] 1878205 - Regression: smbd and nmbd are restarted when samba-winbind package is upgraded [rhel-7.9.z] 1879822 - CVE-2020-1472 samba: Netlogon elevation of privilege vulnerability (Zerologon) 1891685 - CVE-2020-14323 samba: Unprivileged user can crash winbind 1892313 - winbindd memory leak on wbinfo -u with security=ADS [rhel-7.9.z] 1892631 - CVE-2020-14318 samba: Missing handle permissions check in SMB1/2/3 ChangeNotify
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: samba-4.10.16-9.el7_9.src.rpm
noarch: samba-common-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-4.10.16-9.el7_9.i686.rpm libsmbclient-4.10.16-9.el7_9.x86_64.rpm libwbclient-4.10.16-9.el7_9.i686.rpm libwbclient-4.10.16-9.el7_9.x86_64.rpm samba-client-4.10.16-9.el7_9.x86_64.rpm samba-client-libs-4.10.16-9.el7_9.i686.rpm samba-client-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-libs-4.10.16-9.el7_9.i686.rpm samba-common-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-tools-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm samba-libs-4.10.16-9.el7_9.i686.rpm samba-libs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-4.10.16-9.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-9.el7_9.i686.rpm samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: samba-pidl-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-9.el7_9.i686.rpm libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm libwbclient-devel-4.10.16-9.el7_9.i686.rpm libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm samba-4.10.16-9.el7_9.x86_64.rpm samba-dc-4.10.16-9.el7_9.x86_64.rpm samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-devel-4.10.16-9.el7_9.i686.rpm samba-devel-4.10.16-9.el7_9.x86_64.rpm samba-python-4.10.16-9.el7_9.i686.rpm samba-python-4.10.16-9.el7_9.x86_64.rpm samba-python-test-4.10.16-9.el7_9.x86_64.rpm samba-test-4.10.16-9.el7_9.x86_64.rpm samba-test-libs-4.10.16-9.el7_9.i686.rpm samba-test-libs-4.10.16-9.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: samba-4.10.16-9.el7_9.src.rpm
noarch: samba-common-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-4.10.16-9.el7_9.i686.rpm libsmbclient-4.10.16-9.el7_9.x86_64.rpm libwbclient-4.10.16-9.el7_9.i686.rpm libwbclient-4.10.16-9.el7_9.x86_64.rpm samba-client-4.10.16-9.el7_9.x86_64.rpm samba-client-libs-4.10.16-9.el7_9.i686.rpm samba-client-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-libs-4.10.16-9.el7_9.i686.rpm samba-common-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-tools-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-libs-4.10.16-9.el7_9.i686.rpm samba-libs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-4.10.16-9.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-9.el7_9.i686.rpm samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: samba-pidl-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-9.el7_9.i686.rpm libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm libwbclient-devel-4.10.16-9.el7_9.i686.rpm libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm samba-4.10.16-9.el7_9.x86_64.rpm samba-dc-4.10.16-9.el7_9.x86_64.rpm samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-devel-4.10.16-9.el7_9.i686.rpm samba-devel-4.10.16-9.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm samba-python-4.10.16-9.el7_9.i686.rpm samba-python-4.10.16-9.el7_9.x86_64.rpm samba-python-test-4.10.16-9.el7_9.x86_64.rpm samba-test-4.10.16-9.el7_9.x86_64.rpm samba-test-libs-4.10.16-9.el7_9.i686.rpm samba-test-libs-4.10.16-9.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: samba-4.10.16-9.el7_9.src.rpm
noarch: samba-common-4.10.16-9.el7_9.noarch.rpm
ppc64: libsmbclient-4.10.16-9.el7_9.ppc.rpm libsmbclient-4.10.16-9.el7_9.ppc64.rpm libwbclient-4.10.16-9.el7_9.ppc.rpm libwbclient-4.10.16-9.el7_9.ppc64.rpm samba-4.10.16-9.el7_9.ppc64.rpm samba-client-4.10.16-9.el7_9.ppc64.rpm samba-client-libs-4.10.16-9.el7_9.ppc.rpm samba-client-libs-4.10.16-9.el7_9.ppc64.rpm samba-common-libs-4.10.16-9.el7_9.ppc.rpm samba-common-libs-4.10.16-9.el7_9.ppc64.rpm samba-common-tools-4.10.16-9.el7_9.ppc64.rpm samba-debuginfo-4.10.16-9.el7_9.ppc.rpm samba-debuginfo-4.10.16-9.el7_9.ppc64.rpm samba-krb5-printing-4.10.16-9.el7_9.ppc64.rpm samba-libs-4.10.16-9.el7_9.ppc.rpm samba-libs-4.10.16-9.el7_9.ppc64.rpm samba-winbind-4.10.16-9.el7_9.ppc64.rpm samba-winbind-clients-4.10.16-9.el7_9.ppc64.rpm samba-winbind-modules-4.10.16-9.el7_9.ppc.rpm samba-winbind-modules-4.10.16-9.el7_9.ppc64.rpm
ppc64le: libsmbclient-4.10.16-9.el7_9.ppc64le.rpm libwbclient-4.10.16-9.el7_9.ppc64le.rpm samba-4.10.16-9.el7_9.ppc64le.rpm samba-client-4.10.16-9.el7_9.ppc64le.rpm samba-client-libs-4.10.16-9.el7_9.ppc64le.rpm samba-common-libs-4.10.16-9.el7_9.ppc64le.rpm samba-common-tools-4.10.16-9.el7_9.ppc64le.rpm samba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm samba-krb5-printing-4.10.16-9.el7_9.ppc64le.rpm samba-libs-4.10.16-9.el7_9.ppc64le.rpm samba-winbind-4.10.16-9.el7_9.ppc64le.rpm samba-winbind-clients-4.10.16-9.el7_9.ppc64le.rpm samba-winbind-modules-4.10.16-9.el7_9.ppc64le.rpm
s390x: libsmbclient-4.10.16-9.el7_9.s390.rpm libsmbclient-4.10.16-9.el7_9.s390x.rpm libwbclient-4.10.16-9.el7_9.s390.rpm libwbclient-4.10.16-9.el7_9.s390x.rpm samba-4.10.16-9.el7_9.s390x.rpm samba-client-4.10.16-9.el7_9.s390x.rpm samba-client-libs-4.10.16-9.el7_9.s390.rpm samba-client-libs-4.10.16-9.el7_9.s390x.rpm samba-common-libs-4.10.16-9.el7_9.s390.rpm samba-common-libs-4.10.16-9.el7_9.s390x.rpm samba-common-tools-4.10.16-9.el7_9.s390x.rpm samba-debuginfo-4.10.16-9.el7_9.s390.rpm samba-debuginfo-4.10.16-9.el7_9.s390x.rpm samba-krb5-printing-4.10.16-9.el7_9.s390x.rpm samba-libs-4.10.16-9.el7_9.s390.rpm samba-libs-4.10.16-9.el7_9.s390x.rpm samba-winbind-4.10.16-9.el7_9.s390x.rpm samba-winbind-clients-4.10.16-9.el7_9.s390x.rpm samba-winbind-modules-4.10.16-9.el7_9.s390.rpm samba-winbind-modules-4.10.16-9.el7_9.s390x.rpm
x86_64: libsmbclient-4.10.16-9.el7_9.i686.rpm libsmbclient-4.10.16-9.el7_9.x86_64.rpm libwbclient-4.10.16-9.el7_9.i686.rpm libwbclient-4.10.16-9.el7_9.x86_64.rpm samba-4.10.16-9.el7_9.x86_64.rpm samba-client-4.10.16-9.el7_9.x86_64.rpm samba-client-libs-4.10.16-9.el7_9.i686.rpm samba-client-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-libs-4.10.16-9.el7_9.i686.rpm samba-common-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-tools-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm samba-libs-4.10.16-9.el7_9.i686.rpm samba-libs-4.10.16-9.el7_9.x86_64.rpm samba-python-4.10.16-9.el7_9.i686.rpm samba-python-4.10.16-9.el7_9.x86_64.rpm samba-winbind-4.10.16-9.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-9.el7_9.i686.rpm samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Resilient Storage (v. 7):
ppc64le: ctdb-4.10.16-9.el7_9.ppc64le.rpm ctdb-tests-4.10.16-9.el7_9.ppc64le.rpm samba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm
s390x: ctdb-4.10.16-9.el7_9.s390x.rpm ctdb-tests-4.10.16-9.el7_9.s390x.rpm samba-debuginfo-4.10.16-9.el7_9.s390x.rpm
x86_64: ctdb-4.10.16-9.el7_9.x86_64.rpm ctdb-tests-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: samba-pidl-4.10.16-9.el7_9.noarch.rpm
ppc64: libsmbclient-devel-4.10.16-9.el7_9.ppc.rpm libsmbclient-devel-4.10.16-9.el7_9.ppc64.rpm libwbclient-devel-4.10.16-9.el7_9.ppc.rpm libwbclient-devel-4.10.16-9.el7_9.ppc64.rpm samba-dc-4.10.16-9.el7_9.ppc64.rpm samba-dc-libs-4.10.16-9.el7_9.ppc64.rpm samba-debuginfo-4.10.16-9.el7_9.ppc.rpm samba-debuginfo-4.10.16-9.el7_9.ppc64.rpm samba-devel-4.10.16-9.el7_9.ppc.rpm samba-devel-4.10.16-9.el7_9.ppc64.rpm samba-python-4.10.16-9.el7_9.ppc.rpm samba-python-4.10.16-9.el7_9.ppc64.rpm samba-python-test-4.10.16-9.el7_9.ppc64.rpm samba-test-4.10.16-9.el7_9.ppc64.rpm samba-test-libs-4.10.16-9.el7_9.ppc.rpm samba-test-libs-4.10.16-9.el7_9.ppc64.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.ppc64.rpm
ppc64le: libsmbclient-devel-4.10.16-9.el7_9.ppc64le.rpm libwbclient-devel-4.10.16-9.el7_9.ppc64le.rpm samba-dc-4.10.16-9.el7_9.ppc64le.rpm samba-dc-libs-4.10.16-9.el7_9.ppc64le.rpm samba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm samba-devel-4.10.16-9.el7_9.ppc64le.rpm samba-python-4.10.16-9.el7_9.ppc64le.rpm samba-python-test-4.10.16-9.el7_9.ppc64le.rpm samba-test-4.10.16-9.el7_9.ppc64le.rpm samba-test-libs-4.10.16-9.el7_9.ppc64le.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.ppc64le.rpm
s390x: libsmbclient-devel-4.10.16-9.el7_9.s390.rpm libsmbclient-devel-4.10.16-9.el7_9.s390x.rpm libwbclient-devel-4.10.16-9.el7_9.s390.rpm libwbclient-devel-4.10.16-9.el7_9.s390x.rpm samba-dc-4.10.16-9.el7_9.s390x.rpm samba-dc-libs-4.10.16-9.el7_9.s390x.rpm samba-debuginfo-4.10.16-9.el7_9.s390.rpm samba-debuginfo-4.10.16-9.el7_9.s390x.rpm samba-devel-4.10.16-9.el7_9.s390.rpm samba-devel-4.10.16-9.el7_9.s390x.rpm samba-python-4.10.16-9.el7_9.s390.rpm samba-python-4.10.16-9.el7_9.s390x.rpm samba-python-test-4.10.16-9.el7_9.s390x.rpm samba-test-4.10.16-9.el7_9.s390x.rpm samba-test-libs-4.10.16-9.el7_9.s390.rpm samba-test-libs-4.10.16-9.el7_9.s390x.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.s390x.rpm
x86_64: libsmbclient-devel-4.10.16-9.el7_9.i686.rpm libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm libwbclient-devel-4.10.16-9.el7_9.i686.rpm libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm samba-dc-4.10.16-9.el7_9.x86_64.rpm samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-devel-4.10.16-9.el7_9.i686.rpm samba-devel-4.10.16-9.el7_9.x86_64.rpm samba-python-test-4.10.16-9.el7_9.x86_64.rpm samba-test-4.10.16-9.el7_9.x86_64.rpm samba-test-libs-4.10.16-9.el7_9.i686.rpm samba-test-libs-4.10.16-9.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: samba-4.10.16-9.el7_9.src.rpm
noarch: samba-common-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-4.10.16-9.el7_9.i686.rpm libsmbclient-4.10.16-9.el7_9.x86_64.rpm libwbclient-4.10.16-9.el7_9.i686.rpm libwbclient-4.10.16-9.el7_9.x86_64.rpm samba-4.10.16-9.el7_9.x86_64.rpm samba-client-4.10.16-9.el7_9.x86_64.rpm samba-client-libs-4.10.16-9.el7_9.i686.rpm samba-client-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-libs-4.10.16-9.el7_9.i686.rpm samba-common-libs-4.10.16-9.el7_9.x86_64.rpm samba-common-tools-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm samba-libs-4.10.16-9.el7_9.i686.rpm samba-libs-4.10.16-9.el7_9.x86_64.rpm samba-python-4.10.16-9.el7_9.i686.rpm samba-python-4.10.16-9.el7_9.x86_64.rpm samba-winbind-4.10.16-9.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-9.el7_9.i686.rpm samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: samba-pidl-4.10.16-9.el7_9.noarch.rpm
x86_64: libsmbclient-devel-4.10.16-9.el7_9.i686.rpm libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm libwbclient-devel-4.10.16-9.el7_9.i686.rpm libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm samba-dc-4.10.16-9.el7_9.x86_64.rpm samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm samba-debuginfo-4.10.16-9.el7_9.i686.rpm samba-debuginfo-4.10.16-9.el7_9.x86_64.rpm samba-devel-4.10.16-9.el7_9.i686.rpm samba-devel-4.10.16-9.el7_9.x86_64.rpm samba-python-test-4.10.16-9.el7_9.x86_64.rpm samba-test-4.10.16-9.el7_9.x86_64.rpm samba-test-libs-4.10.16-9.el7_9.i686.rpm samba-test-libs-4.10.16-9.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-1472 https://access.redhat.com/security/cve/CVE-2020-14318 https://access.redhat.com/security/cve/CVE-2020-14323 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX9idqtzjgjWX9erEAQhLxg//aGgge7wuhwtrhosIFhpoMEPD3hrlBtLk 5uRe7SaKoJa65TxAbnAD2IRP118/bZyXkS4zi1NMW3cDubvdz+pXJEq5Avfp28qp 7HcfGUKrgcDzRXlAUGBMk9P7kfCUx+jiGluhO/qsFs3TbMxcZoQ8HJxP1php4tCd ibIHVRPRS8Z+o2SzwvSW0AnkYJTTBGCht0JZKN9rIaWwljYgUXW1Fy9CTAGd48Jc EcRDHn4sDNGKl60g77e/7FVpIz7HjNyD+AWtVx8hhf6IguJnPJF9LnP1Msu0fjMd K1eCVDOwlIbZYE11+bJ28sy90HEzsihUO5KJgUgn1yj28JVaezm6dm9TT8RG/N0P 6p4tJhW8OkmVgM7ltbPI6ENfyFih/LWKekEc0LUxbFUmD3u/aytwl8OaF/0vxdGV L/7fY5QIAdLKsgNrDl817XAHmtVaarwg6swfM/iOwICatlNiAIeEr4hbCc/ZvkCI iiVLKa64AXcBuIXBERa4lzqqjeCbAc0vuXG5zyk9wY23fORfrxZBYvU9SSfstubQ OR3F7Q3wDX9Nx7pdYnSmwwhHnVq8kNXO62agaKvlmQ3Z7exeLzdDM6Wy1wdXpYzi 4bPulpSOhcwDieCQLfPb+fMo13lbkfLX1eX1PeG0pK/nv//KBkkiTp1nLlHwRZzM 2lNVzS89G3A= =hQrq -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-4510-2 September 17, 2020
samba vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
Summary:
Samba would allow unintended access to files over the network. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Tom Tervoort discovered that the Netlogon protocol implemented by Samba incorrectly handled the authentication scheme.
This update fixes the issue by changing the "server schannel" setting to default to "yes", instead of "auto", which will force a secure netlogon channel. This may result in compatibility issues with older devices. A future update may allow a finer-grained control over this setting.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 ESM: samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm9
In general, a standard system update will make all the necessary changes. See the following link for examples: https://www.samba.org/samba/security/CVE-2020-1472.html
In addition, this update adds additional server checks for the protocol attack in the client-specified challenge to provide some protection when 'server schannel = no/auto' and avoid the false-positive results when running the proof-of-concept exploit. Description:
Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0248", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.12.0" }, { "model": "windows server 1909", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "zfs storage appliance kit", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.8" }, { "model": "windows server 2008", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "20.04" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.10.18" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.11.13" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "samba", "scope": "gte", "trust": 1.0, "vendor": "samba", "version": "4.11.0" }, { "model": "windows server 1903", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "windows server 2016", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "directory server", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "4.4.5-0101" }, { "model": "windows server 20h2", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "windows server 2004", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "samba", "scope": "lt", "trust": 1.0, "vendor": "samba", "version": "4.12.7" }, { "model": "windows server 2019", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" } ], "sources": [ { "db": "NVD", "id": "CVE-2020-1472" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.5-0101", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.12.7", "versionStartIncluding": "4.12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.11.13", "versionStartIncluding": "4.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.18", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-1472" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This document was written by Eric Hatleback, Art Manion, and Will Dormann.We have not received a statement from the vendor.", "sources": [ { "db": "CERT/CC", "id": "VU#490028" } ], "trust": 0.8 }, "cve": "CVE-2020-1472", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-167626", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2020-1472", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "secure@microsoft.com", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-1472", "trust": 1.0, "value": "CRITICAL" }, { "author": "secure@microsoft.com", "id": "CVE-2020-1472", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202008-548", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-167626", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-1472", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-167626" }, { "db": "VULMON", "id": "CVE-2020-1472" }, { "db": "CNNVD", "id": "CNNVD-202008-548" }, { "db": "NVD", "id": "CVE-2020-1472" }, { "db": "NVD", "id": "CVE-2020-1472" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. \nTo exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. \nMicrosoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. \nFor guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). \nWhen the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications. The Microsoft Windows Netlogon Remote Protocol (MS-NRPC) reuses a known, static, zero-value initialization vector (IV) in AES-CFB8 mode. Both Microsoft Windows and Microsoft Windows Server are products of Microsoft Corporation. Microsoft Windows is an operating system for personal devices. Microsoft Windows Server is a server operating system. Netlogon is a service used to register all SRV resource records for domain controllers. An elevation of privilege vulnerability exists in Microsoft Windows NetLogon. The following products and versions are affected: Microsoft Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 1903, Windows Server 1909, Windows Server 2004. A flaw was found in the way samba handled file and directory permissions. (CVE-2020-14318)\nA null pointer dereference flaw was found in Samba\u0027s winbind service. This flaw allows a local user to crash the winbind service, causing a denial of service. The highest threat from this vulnerability is to system availability. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2020-1472). 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nThe following packages have been upgraded to a later upstream version:\nsamba (4.13.3). \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.4 Release Notes linked from the References section. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202012-24\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Samba: Multiple vulnerabilities\n Date: December 24, 2020\n Bugs: #743433, #751724\n ID: 202012-24\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Samba, the worst of which\ncould result in a Denial of Service condition. \n\nBackground\n==========\n\nSamba is a suite of SMB and CIFS client/server programs. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-fs/samba \u003c 4.12.9 \u003e= 4.12.9\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Samba. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Samba users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-fs/samba-4.12.9\"\n\nReferences\n==========\n\n[ 1 ] CVE-2020-14318\n https://nvd.nist.gov/vuln/detail/CVE-2020-14318\n[ 2 ] CVE-2020-14323\n https://nvd.nist.gov/vuln/detail/CVE-2020-14323\n[ 3 ] CVE-2020-14383\n https://nvd.nist.gov/vuln/detail/CVE-2020-14383\n[ 4 ] CVE-2020-1472\n https://nvd.nist.gov/vuln/detail/CVE-2020-1472\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202012-24\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: samba security and bug fix update\nAdvisory ID: RHSA-2020:5439-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:5439\nIssue date: 2020-12-15\nCVE Names: CVE-2020-1472 CVE-2020-14318 CVE-2020-14323 \n=====================================================================\n\n1. Summary:\n\nAn update for samba is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Resilient Storage (v. 7) - ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nSamba is an open-source implementation of the Server Message Block (SMB)\nprotocol and the related Common Internet File System (CIFS) protocol, which\nallow PC-compatible machines to share files, printers, and various\ninformation. \n\nSecurity Fix(es):\n\n* samba: Netlogon elevation of privilege vulnerability (Zerologon)\n(CVE-2020-1472)\n\n* samba: Missing handle permissions check in SMB1/2/3 ChangeNotify\n(CVE-2020-14318)\n\n* samba: Unprivileged user can crash winbind (CVE-2020-14323)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* The \u0027require_membership_of\u0027 documentation in pam_winbind manpage is\nincorrect (BZ#1853272)\n\n* Malfunctioning %U substitution in valid users option (BZ#1868917)\n\n* Regression: smbd and nmbd are restarted when samba-winbind package is\nupgraded (BZ#1878205)\n\n* winbindd memory leak on wbinfo -u with security=ADS (BZ#1892313)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the smb service will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1853272 - The \u0027require_membership_of\u0027 documentation in pam_winbind manpage is incorrect [rhel-7.9.z]\n1868917 - Malfunctioning %U substitution in valid users option [rhel-7.9.z]\n1878205 - Regression: smbd and nmbd are restarted when samba-winbind package is upgraded [rhel-7.9.z]\n1879822 - CVE-2020-1472 samba: Netlogon elevation of privilege vulnerability (Zerologon)\n1891685 - CVE-2020-14323 samba: Unprivileged user can crash winbind\n1892313 - winbindd memory leak on wbinfo -u with security=ADS [rhel-7.9.z]\n1892631 - CVE-2020-14318 samba: Missing handle permissions check in SMB1/2/3 ChangeNotify\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nsamba-4.10.16-9.el7_9.src.rpm\n\nnoarch:\nsamba-common-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-4.10.16-9.el7_9.i686.rpm\nlibwbclient-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-libs-4.10.16-9.el7_9.i686.rpm\nsamba-client-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-libs-4.10.16-9.el7_9.i686.rpm\nsamba-common-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-tools-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm\nsamba-libs-4.10.16-9.el7_9.i686.rpm\nsamba-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.i686.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibwbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-devel-4.10.16-9.el7_9.i686.rpm\nsamba-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-4.10.16-9.el7_9.i686.rpm\nsamba-python-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-libs-4.10.16-9.el7_9.i686.rpm\nsamba-test-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nsamba-4.10.16-9.el7_9.src.rpm\n\nnoarch:\nsamba-common-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-4.10.16-9.el7_9.i686.rpm\nlibwbclient-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-libs-4.10.16-9.el7_9.i686.rpm\nsamba-client-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-libs-4.10.16-9.el7_9.i686.rpm\nsamba-common-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-tools-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-libs-4.10.16-9.el7_9.i686.rpm\nsamba-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.i686.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibwbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-devel-4.10.16-9.el7_9.i686.rpm\nsamba-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-4.10.16-9.el7_9.i686.rpm\nsamba-python-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-libs-4.10.16-9.el7_9.i686.rpm\nsamba-test-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nsamba-4.10.16-9.el7_9.src.rpm\n\nnoarch:\nsamba-common-4.10.16-9.el7_9.noarch.rpm\n\nppc64:\nlibsmbclient-4.10.16-9.el7_9.ppc.rpm\nlibsmbclient-4.10.16-9.el7_9.ppc64.rpm\nlibwbclient-4.10.16-9.el7_9.ppc.rpm\nlibwbclient-4.10.16-9.el7_9.ppc64.rpm\nsamba-4.10.16-9.el7_9.ppc64.rpm\nsamba-client-4.10.16-9.el7_9.ppc64.rpm\nsamba-client-libs-4.10.16-9.el7_9.ppc.rpm\nsamba-client-libs-4.10.16-9.el7_9.ppc64.rpm\nsamba-common-libs-4.10.16-9.el7_9.ppc.rpm\nsamba-common-libs-4.10.16-9.el7_9.ppc64.rpm\nsamba-common-tools-4.10.16-9.el7_9.ppc64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc64.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.ppc64.rpm\nsamba-libs-4.10.16-9.el7_9.ppc.rpm\nsamba-libs-4.10.16-9.el7_9.ppc64.rpm\nsamba-winbind-4.10.16-9.el7_9.ppc64.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.ppc64.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.ppc.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.ppc64.rpm\n\nppc64le:\nlibsmbclient-4.10.16-9.el7_9.ppc64le.rpm\nlibwbclient-4.10.16-9.el7_9.ppc64le.rpm\nsamba-4.10.16-9.el7_9.ppc64le.rpm\nsamba-client-4.10.16-9.el7_9.ppc64le.rpm\nsamba-client-libs-4.10.16-9.el7_9.ppc64le.rpm\nsamba-common-libs-4.10.16-9.el7_9.ppc64le.rpm\nsamba-common-tools-4.10.16-9.el7_9.ppc64le.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.ppc64le.rpm\nsamba-libs-4.10.16-9.el7_9.ppc64le.rpm\nsamba-winbind-4.10.16-9.el7_9.ppc64le.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.ppc64le.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.ppc64le.rpm\n\ns390x:\nlibsmbclient-4.10.16-9.el7_9.s390.rpm\nlibsmbclient-4.10.16-9.el7_9.s390x.rpm\nlibwbclient-4.10.16-9.el7_9.s390.rpm\nlibwbclient-4.10.16-9.el7_9.s390x.rpm\nsamba-4.10.16-9.el7_9.s390x.rpm\nsamba-client-4.10.16-9.el7_9.s390x.rpm\nsamba-client-libs-4.10.16-9.el7_9.s390.rpm\nsamba-client-libs-4.10.16-9.el7_9.s390x.rpm\nsamba-common-libs-4.10.16-9.el7_9.s390.rpm\nsamba-common-libs-4.10.16-9.el7_9.s390x.rpm\nsamba-common-tools-4.10.16-9.el7_9.s390x.rpm\nsamba-debuginfo-4.10.16-9.el7_9.s390.rpm\nsamba-debuginfo-4.10.16-9.el7_9.s390x.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.s390x.rpm\nsamba-libs-4.10.16-9.el7_9.s390.rpm\nsamba-libs-4.10.16-9.el7_9.s390x.rpm\nsamba-winbind-4.10.16-9.el7_9.s390x.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.s390x.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.s390.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.s390x.rpm\n\nx86_64:\nlibsmbclient-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-4.10.16-9.el7_9.i686.rpm\nlibwbclient-4.10.16-9.el7_9.x86_64.rpm\nsamba-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-libs-4.10.16-9.el7_9.i686.rpm\nsamba-client-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-libs-4.10.16-9.el7_9.i686.rpm\nsamba-common-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-tools-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm\nsamba-libs-4.10.16-9.el7_9.i686.rpm\nsamba-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-4.10.16-9.el7_9.i686.rpm\nsamba-python-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.i686.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Resilient Storage (v. 7):\n\nppc64le:\nctdb-4.10.16-9.el7_9.ppc64le.rpm\nctdb-tests-4.10.16-9.el7_9.ppc64le.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm\n\ns390x:\nctdb-4.10.16-9.el7_9.s390x.rpm\nctdb-tests-4.10.16-9.el7_9.s390x.rpm\nsamba-debuginfo-4.10.16-9.el7_9.s390x.rpm\n\nx86_64:\nctdb-4.10.16-9.el7_9.x86_64.rpm\nctdb-tests-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-9.el7_9.noarch.rpm\n\nppc64:\nlibsmbclient-devel-4.10.16-9.el7_9.ppc.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.ppc64.rpm\nlibwbclient-devel-4.10.16-9.el7_9.ppc.rpm\nlibwbclient-devel-4.10.16-9.el7_9.ppc64.rpm\nsamba-dc-4.10.16-9.el7_9.ppc64.rpm\nsamba-dc-libs-4.10.16-9.el7_9.ppc64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc64.rpm\nsamba-devel-4.10.16-9.el7_9.ppc.rpm\nsamba-devel-4.10.16-9.el7_9.ppc64.rpm\nsamba-python-4.10.16-9.el7_9.ppc.rpm\nsamba-python-4.10.16-9.el7_9.ppc64.rpm\nsamba-python-test-4.10.16-9.el7_9.ppc64.rpm\nsamba-test-4.10.16-9.el7_9.ppc64.rpm\nsamba-test-libs-4.10.16-9.el7_9.ppc.rpm\nsamba-test-libs-4.10.16-9.el7_9.ppc64.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.ppc64.rpm\n\nppc64le:\nlibsmbclient-devel-4.10.16-9.el7_9.ppc64le.rpm\nlibwbclient-devel-4.10.16-9.el7_9.ppc64le.rpm\nsamba-dc-4.10.16-9.el7_9.ppc64le.rpm\nsamba-dc-libs-4.10.16-9.el7_9.ppc64le.rpm\nsamba-debuginfo-4.10.16-9.el7_9.ppc64le.rpm\nsamba-devel-4.10.16-9.el7_9.ppc64le.rpm\nsamba-python-4.10.16-9.el7_9.ppc64le.rpm\nsamba-python-test-4.10.16-9.el7_9.ppc64le.rpm\nsamba-test-4.10.16-9.el7_9.ppc64le.rpm\nsamba-test-libs-4.10.16-9.el7_9.ppc64le.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.ppc64le.rpm\n\ns390x:\nlibsmbclient-devel-4.10.16-9.el7_9.s390.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.s390x.rpm\nlibwbclient-devel-4.10.16-9.el7_9.s390.rpm\nlibwbclient-devel-4.10.16-9.el7_9.s390x.rpm\nsamba-dc-4.10.16-9.el7_9.s390x.rpm\nsamba-dc-libs-4.10.16-9.el7_9.s390x.rpm\nsamba-debuginfo-4.10.16-9.el7_9.s390.rpm\nsamba-debuginfo-4.10.16-9.el7_9.s390x.rpm\nsamba-devel-4.10.16-9.el7_9.s390.rpm\nsamba-devel-4.10.16-9.el7_9.s390x.rpm\nsamba-python-4.10.16-9.el7_9.s390.rpm\nsamba-python-4.10.16-9.el7_9.s390x.rpm\nsamba-python-test-4.10.16-9.el7_9.s390x.rpm\nsamba-test-4.10.16-9.el7_9.s390x.rpm\nsamba-test-libs-4.10.16-9.el7_9.s390.rpm\nsamba-test-libs-4.10.16-9.el7_9.s390x.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.s390x.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibwbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-devel-4.10.16-9.el7_9.i686.rpm\nsamba-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-libs-4.10.16-9.el7_9.i686.rpm\nsamba-test-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nsamba-4.10.16-9.el7_9.src.rpm\n\nnoarch:\nsamba-common-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-4.10.16-9.el7_9.i686.rpm\nlibwbclient-4.10.16-9.el7_9.x86_64.rpm\nsamba-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-4.10.16-9.el7_9.x86_64.rpm\nsamba-client-libs-4.10.16-9.el7_9.i686.rpm\nsamba-client-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-libs-4.10.16-9.el7_9.i686.rpm\nsamba-common-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-common-tools-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm\nsamba-libs-4.10.16-9.el7_9.i686.rpm\nsamba-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-4.10.16-9.el7_9.i686.rpm\nsamba-python-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.i686.rpm\nsamba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nsamba-pidl-4.10.16-9.el7_9.noarch.rpm\n\nx86_64:\nlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nlibwbclient-devel-4.10.16-9.el7_9.i686.rpm\nlibwbclient-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-4.10.16-9.el7_9.x86_64.rpm\nsamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-debuginfo-4.10.16-9.el7_9.i686.rpm\nsamba-debuginfo-4.10.16-9.el7_9.x86_64.rpm\nsamba-devel-4.10.16-9.el7_9.i686.rpm\nsamba-devel-4.10.16-9.el7_9.x86_64.rpm\nsamba-python-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-4.10.16-9.el7_9.x86_64.rpm\nsamba-test-libs-4.10.16-9.el7_9.i686.rpm\nsamba-test-libs-4.10.16-9.el7_9.x86_64.rpm\nsamba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm\nsamba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-1472\nhttps://access.redhat.com/security/cve/CVE-2020-14318\nhttps://access.redhat.com/security/cve/CVE-2020-14323\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBX9idqtzjgjWX9erEAQhLxg//aGgge7wuhwtrhosIFhpoMEPD3hrlBtLk\n5uRe7SaKoJa65TxAbnAD2IRP118/bZyXkS4zi1NMW3cDubvdz+pXJEq5Avfp28qp\n7HcfGUKrgcDzRXlAUGBMk9P7kfCUx+jiGluhO/qsFs3TbMxcZoQ8HJxP1php4tCd\nibIHVRPRS8Z+o2SzwvSW0AnkYJTTBGCht0JZKN9rIaWwljYgUXW1Fy9CTAGd48Jc\nEcRDHn4sDNGKl60g77e/7FVpIz7HjNyD+AWtVx8hhf6IguJnPJF9LnP1Msu0fjMd\nK1eCVDOwlIbZYE11+bJ28sy90HEzsihUO5KJgUgn1yj28JVaezm6dm9TT8RG/N0P\n6p4tJhW8OkmVgM7ltbPI6ENfyFih/LWKekEc0LUxbFUmD3u/aytwl8OaF/0vxdGV\nL/7fY5QIAdLKsgNrDl817XAHmtVaarwg6swfM/iOwICatlNiAIeEr4hbCc/ZvkCI\niiVLKa64AXcBuIXBERa4lzqqjeCbAc0vuXG5zyk9wY23fORfrxZBYvU9SSfstubQ\nOR3F7Q3wDX9Nx7pdYnSmwwhHnVq8kNXO62agaKvlmQ3Z7exeLzdDM6Wy1wdXpYzi\n4bPulpSOhcwDieCQLfPb+fMo13lbkfLX1eX1PeG0pK/nv//KBkkiTp1nLlHwRZzM\n2lNVzS89G3A=\n=hQrq\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. =========================================================================\nUbuntu Security Notice USN-4510-2\nSeptember 17, 2020\n\nsamba vulnerability\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSamba would allow unintended access to files over the network. This update provides\nthe corresponding update for Ubuntu 14.04 ESM. \n\nOriginal advisory details:\n\n Tom Tervoort discovered that the Netlogon protocol implemented by Samba\n incorrectly handled the authentication scheme. \n\n This update fixes the issue by changing the \"server schannel\" setting to\n default to \"yes\", instead of \"auto\", which will force a secure netlogon\n channel. This may result in compatibility issues with older devices. A\n future update may allow a finer-grained control over this setting. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 ESM:\n samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm9\n\nIn general, a standard system update will make all the necessary changes. See the following link for\nexamples: https://www.samba.org/samba/security/CVE-2020-1472.html\n\nIn addition, this update adds additional server checks for the protocol\nattack in the client-specified challenge to provide some protection when\n\u0027server schannel = no/auto\u0027 and avoid the false-positive results when\nrunning the proof-of-concept exploit. Description:\n\nRed Hat Gluster Storage is a software only scale-out storage solution that\nprovides flexible and affordable unstructured data storage. It unifies data\nstorage and infrastructure, increases performance, and improves\navailability and manageability to meet enterprise-level storage challenges. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied", "sources": [ { "db": "NVD", "id": "CVE-2020-1472" }, { "db": "CERT/CC", "id": "VU#490028" }, { "db": "VULHUB", "id": "VHN-167626" }, { "db": "VULMON", "id": "CVE-2020-1472" }, { "db": "PACKETSTORM", "id": "162645" }, { "db": "PACKETSTORM", "id": "160717" }, { "db": "PACKETSTORM", "id": "159206" }, { "db": "PACKETSTORM", "id": "160507" }, { "db": "PACKETSTORM", "id": "159207" }, { "db": "PACKETSTORM", "id": "159414" }, { "db": "PACKETSTORM", "id": "164406" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-167626", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-167626" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-1472", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#490028", "trust": 2.5 }, { "db": "PACKETSTORM", "id": "160127", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "159190", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/09/17/2", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "160507", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "162645", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159207", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "160717", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159414", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202008-548", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "49071", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164406", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.4143", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2604", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3188", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.6539", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3219", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3239", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2781", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3417", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4436", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3303", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1706", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "160823", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021100615", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021052030", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042837", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021063032", "trust": 0.6 }, { "db": "NSFOCUS", "id": "48189", "trust": 0.6 }, { "db": "NSFOCUS", "id": "48563", "trust": 0.6 }, { "db": "CXSECURITY", "id": "WLB-2020110151", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "159206", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-98378", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-167626", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-1472", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#490028" }, { "db": "VULHUB", "id": "VHN-167626" }, { "db": "VULMON", "id": "CVE-2020-1472" }, { "db": "PACKETSTORM", "id": "162645" }, { "db": "PACKETSTORM", "id": "160717" }, { "db": "PACKETSTORM", "id": "159206" }, { "db": "PACKETSTORM", "id": "160507" }, { "db": "PACKETSTORM", "id": "159207" }, { "db": "PACKETSTORM", "id": "159414" }, { "db": "PACKETSTORM", "id": "164406" }, { "db": "CNNVD", "id": "CNNVD-202008-548" }, { "db": "NVD", "id": "CVE-2020-1472" } ] }, "id": "VAR-202008-0248", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-167626" } ], "trust": 1.1 }, "last_update_date": "2024-07-23T21:01:54.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Moderate: samba security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205439 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: samba: CVE-2020-1472", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=158adc4a67e7a9fc23bf2da40547c403" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-1472 log" }, { "title": "Amazon Linux AMI: ALAS-2021-1469", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2021-1469" }, { "title": "CVE-2020-1472 POC", "trust": 0.1, "url": "https://github.com/fa1c0n35/cve-2020-1472 " }, { "title": "https://github.com/murataydemir/CVE-2020-1472", "trust": 0.1, "url": "https://github.com/murataydemir/cve-2020-1472 " }, { "title": "CVE-2020-1472 POC", "trust": 0.1, "url": "https://github.com/npocmak/cve-2020-1472 " }, { "title": "CVE-2020-1472\nExploit", "trust": 0.1, "url": "https://github.com/voidsec/cve-2020-1472 " }, { "title": "CVE-2020-1472", "trust": 0.1, "url": "https://github.com/sv3nbeast/cve-2020-1472 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-1472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.1 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-167626" }, { "db": "NVD", "id": "CVE-2020-1472" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.kb.cert.org/vuls/id/490028" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/159190/zerologon-proof-of-concept.html" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/160127/zerologon-netlogon-privilege-escalation.html" }, { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpuapr2021.html" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/202012-24" }, { "trust": 1.7, "url": "https://www.synology.com/security/advisory/synology_sa_20_21" }, { "trust": 1.7, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-1472" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/4510-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/4510-2/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/4559-1/" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1472" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/h4otfbl6ydvfh2tbjfjie4fmhpjeejk3/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/st6x3a2xxymgd4inr26dq4fp4qsm753b/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/tapqqzzat4tg3xvrtafv2y3s7oahfbup/" }, { "trust": 0.8, "url": "cve-2020-1472 " }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/h4otfbl6ydvfh2tbjfjie4fmhpjeejk3/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/tapqqzzat4tg3xvrtafv2y3s7oahfbup/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/st6x3a2xxymgd4inr26dq4fp4qsm753b/" }, { "trust": 0.6, "url": "https://media.cert.europa.eu/static/securityadvisories/2020/cert-eu-sa2020-046.pdf" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulnerability-from-samba-affects-ibm-netezza-host-management/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1706" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162645/red-hat-security-advisory-2021-1647-01.html" }, { "trust": 0.6, "url": "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2020-1472" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021052030" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/microsoft-windows-vulnerabilities-of-august-2020-33057" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164406/red-hat-security-advisory-2021-3723-01.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/issue/wlb-2020110151" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4143/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2781" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160823/understanding-and-exploiting-zerologon.html" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20200925-01-netlogon-cn" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4436/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021063032" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160507/red-hat-security-advisory-2020-5439-01.html" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48189" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48563" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160717/gentoo-linux-security-advisory-202012-24.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3417/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3219/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6539" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/microsoft-windows-samba-privilege-escalation-via-active-directory-domain-services-zerologon-33336" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3239/" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/49071" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042837" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2604" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159207/ubuntu-security-notice-usn-4510-2.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3303" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021100615" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159414/ubuntu-security-notice-usn-4559-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3188/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14323" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14318" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-14318" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-14323" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-1472" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://usn.ubuntu.com/4510-1" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1647" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/5435971" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14383" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.30" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:5439" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4510-2" }, { "trust": 0.1, "url": "https://www.samba.org/samba/security/cve-2020-1472.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4559-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.31" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.11.6+dfsg-0ubuntu1.5" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.20" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20254" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20254" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3723" } ], "sources": [ { "db": "CERT/CC", "id": "VU#490028" }, { "db": "VULHUB", "id": "VHN-167626" }, { "db": "PACKETSTORM", "id": "162645" }, { "db": "PACKETSTORM", "id": "160717" }, { "db": "PACKETSTORM", "id": "159206" }, { "db": "PACKETSTORM", "id": "160507" }, { "db": "PACKETSTORM", "id": "159207" }, { "db": "PACKETSTORM", "id": "159414" }, { "db": "PACKETSTORM", "id": "164406" }, { "db": "CNNVD", "id": "CNNVD-202008-548" }, { "db": "NVD", "id": "CVE-2020-1472" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#490028" }, { "db": "VULHUB", "id": "VHN-167626" }, { "db": "VULMON", "id": "CVE-2020-1472" }, { "db": "PACKETSTORM", "id": "162645" }, { "db": "PACKETSTORM", "id": "160717" }, { "db": "PACKETSTORM", "id": "159206" }, { "db": "PACKETSTORM", "id": "160507" }, { "db": "PACKETSTORM", "id": "159207" }, { "db": "PACKETSTORM", "id": "159414" }, { "db": "PACKETSTORM", "id": "164406" }, { "db": "CNNVD", "id": "CNNVD-202008-548" }, { "db": "NVD", "id": "CVE-2020-1472" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-16T00:00:00", "db": "CERT/CC", "id": "VU#490028" }, { "date": "2020-08-17T00:00:00", "db": "VULHUB", "id": "VHN-167626" }, { "date": "2020-08-17T00:00:00", "db": "VULMON", "id": "CVE-2020-1472" }, { "date": "2021-05-19T14:02:40", "db": "PACKETSTORM", "id": "162645" }, { "date": "2020-12-24T17:21:15", "db": "PACKETSTORM", "id": "160717" }, { "date": "2020-09-17T14:07:24", "db": "PACKETSTORM", "id": "159206" }, { "date": "2020-12-15T15:48:52", "db": "PACKETSTORM", "id": "160507" }, { "date": "2020-09-17T14:07:32", "db": "PACKETSTORM", "id": "159207" }, { "date": "2020-09-30T15:54:06", "db": "PACKETSTORM", "id": "159414" }, { "date": "2021-10-05T14:54:07", "db": "PACKETSTORM", "id": "164406" }, { "date": "2020-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-548" }, { "date": "2020-08-17T19:15:15.117000", "db": "NVD", "id": "CVE-2020-1472" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-19T00:00:00", "db": "CERT/CC", "id": "VU#490028" }, { "date": "2022-04-26T00:00:00", "db": "VULHUB", "id": "VHN-167626" }, { "date": "2024-01-19T00:00:00", "db": "VULMON", "id": "CVE-2020-1472" }, { "date": "2022-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-548" }, { "date": "2024-05-23T17:56:29.137000", "db": "NVD", "id": "CVE-2020-1472" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "159206" }, { "db": "PACKETSTORM", "id": "159207" }, { "db": "PACKETSTORM", "id": "159414" }, { "db": "CNNVD", "id": "CNNVD-202008-548" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft Windows Netlogon Remote Protocol (MS-NRPC) uses insecure AES-CFB8 initialization vector", "sources": [ { "db": "CERT/CC", "id": "VU#490028" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-548" } ], "trust": 0.6 } }