CVE-2012-2111
Vulnerability from cvelistv5
Published
2012-04-30 14:00
Modified
2024-08-06 19:26
Severity ?
Summary
The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://osvdb.org/81648
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-0533.html
secalert@redhat.comhttp://secunia.com/advisories/48976
secalert@redhat.comhttp://secunia.com/advisories/48984
secalert@redhat.comhttp://secunia.com/advisories/48996
secalert@redhat.comhttp://secunia.com/advisories/48999
secalert@redhat.comhttp://secunia.com/advisories/49017
secalert@redhat.comhttp://secunia.com/advisories/49030
secalert@redhat.comhttp://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2463
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:067
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2012-2111Patch, Vendor Advisory
secalert@redhat.comhttp://www.securitytracker.com/id?1026988
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1434-1
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.865Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1434-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1434-1"
          },
          {
            "name": "81648",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/81648"
          },
          {
            "name": "SUSE-SU-2012:0591",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html"
          },
          {
            "name": "MDVSA-2012:067",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067"
          },
          {
            "name": "48996",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48996"
          },
          {
            "name": "FEDORA-2012-6981",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html"
          },
          {
            "name": "49017",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49017"
          },
          {
            "name": "1026988",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026988"
          },
          {
            "name": "HPSBUX02789",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.samba.org/samba/security/CVE-2012-2111"
          },
          {
            "name": "48976",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48976"
          },
          {
            "name": "openSUSE-SU-2012:0583",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html"
          },
          {
            "name": "FEDORA-2012-6999",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html"
          },
          {
            "name": "49030",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49030"
          },
          {
            "name": "FEDORA-2012-7006",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
          },
          {
            "name": "48984",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48984"
          },
          {
            "name": "48999",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48999"
          },
          {
            "name": "SUSE-SU-2012:0573",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html"
          },
          {
            "name": "DSA-2463",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2463"
          },
          {
            "name": "SSRT100824",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
          },
          {
            "name": "RHSA-2012:0533",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the \"take ownership\" privilege via an LSA connection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1434-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1434-1"
        },
        {
          "name": "81648",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/81648"
        },
        {
          "name": "SUSE-SU-2012:0591",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html"
        },
        {
          "name": "MDVSA-2012:067",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067"
        },
        {
          "name": "48996",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48996"
        },
        {
          "name": "FEDORA-2012-6981",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html"
        },
        {
          "name": "49017",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49017"
        },
        {
          "name": "1026988",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026988"
        },
        {
          "name": "HPSBUX02789",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.samba.org/samba/security/CVE-2012-2111"
        },
        {
          "name": "48976",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48976"
        },
        {
          "name": "openSUSE-SU-2012:0583",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html"
        },
        {
          "name": "FEDORA-2012-6999",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html"
        },
        {
          "name": "49030",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49030"
        },
        {
          "name": "FEDORA-2012-7006",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
        },
        {
          "name": "48984",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48984"
        },
        {
          "name": "48999",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48999"
        },
        {
          "name": "SUSE-SU-2012:0573",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html"
        },
        {
          "name": "DSA-2463",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2463"
        },
        {
          "name": "SSRT100824",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
        },
        {
          "name": "RHSA-2012:0533",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2111",
    "datePublished": "2012-04-30T14:00:00",
    "dateReserved": "2012-04-04T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.865Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-2111\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-04-30T14:55:03.000\",\"lastModified\":\"2018-01-05T02:29:32.040\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the \\\"take ownership\\\" privilege via an LSA connection.\"},{\"lang\":\"es\",\"value\":\"El (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, y (4) RemoveAccountRights LSA RPC procedimientos en smbd de Samba v3.4.x anterior a v3.4.17, v3.5.x anterior a v3.5.15 y  v3.6.x anterior a v3.6.5 no restringe correctamente las modificaciones en la base de datos de privilegios, permitiendo a usuarios remotos autenticados  obtener la \\\"toma de posesi\u00f3n\\\"  de privilegios a trav\u00e9s de una conexi\u00f3n LSA.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.5},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C78E2B3A-10C4-4226-A224-8D4AC792B2F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFFCF854-E316-442F-A62F-ACC1CA4E9892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43FE147E-B1D1-4BC2-ACC0-85F39674C064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A63AC0-2B68-46A8-AD96-657C99463E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BD30B7-E182-402B-BE72-6C82DC085872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0C00E2-AD14-46A1-A695-FFE81547303B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4633D2E-2CBE-4B92-AD35-ED57C5399ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F200FC8-DA2E-4D39-8FF7-423759307DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B7341D-B02F-405B-81A0-5F74CFA8F8E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E207B352-D8F8-4E15-9507-D3AD10D56211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F01226-D9E6-460C-975A-618932D5F16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD98764-741C-4FED-BE4D-446E8E8D31F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4048DF8D-628D-4786-A883-0A1865DEBB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E7A4E4-940B-43C4-98A2-70F443A59120\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5900E6E-4379-4321-B69D-F9FBD341ACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C56B31-4495-4974-A47F-7D18734C9B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC8C2E40-DA05-4B50-AB29-398AF71EBECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5E81ED-032F-42B7-9D50-15CADE337AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDD90A4-B50B-4640-ADDE-B75BBC34507C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFC3804-991A-4BAF-818E-E321DB21FB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE1B4D9-507A-43B2-81F3-77E411ABEF7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857FCD47-F720-4273-BF1D-D5DC95ECA6D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8FE4AC-6E71-44CF-902D-BACA830C4CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EE762A-F95F-42CF-BB80-B0EF81A438EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738095D8-8ACE-4CF4-9D97-4228FC686F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D4634FC-DA4E-4B1D-B1AB-A45D8235780D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA83A66-BD39-4560-8EAF-ADF2433EF36D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B1F854-FC98-4DE9-8514-FD52301C5038\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66999F57-FF99-419F-BB12-35DC79FCE945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD1356E-3B43-4C5B-9969-902440918EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7F3209-B376-490B-A761-2CCB6CEE209A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"406C2297-B58D-4623-9E7A-2C438ABBAC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6AF0DD4-08D4-4726-8A12-E979FF3322B0\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/81648\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0533.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48976\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48984\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48996\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48999\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/49017\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/49030\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2463\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:067\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.samba.org/samba/security/CVE-2012-2111\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1026988\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1434-1\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.