cve-2012-1182
Vulnerability from cvelistv5
Published
2012-04-10 21:00
Modified
2024-08-06 18:53
Severity ?
Summary
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2012/May/msg00001.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=133951282306605&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://secunia.com/advisories/48751
secalert@redhat.comhttp://secunia.com/advisories/48754
secalert@redhat.comhttp://secunia.com/advisories/48816
secalert@redhat.comhttp://secunia.com/advisories/48818
secalert@redhat.comhttp://secunia.com/advisories/48844
secalert@redhat.comhttp://secunia.com/advisories/48873
secalert@redhat.comhttp://secunia.com/advisories/48879
secalert@redhat.comhttp://secunia.com/advisories/48999
secalert@redhat.comhttp://support.apple.com/kb/HT5281
secalert@redhat.comhttp://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2450
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:055
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.6.4.html
secalert@redhat.comhttp://www.securitytracker.com/id?1026913
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1423-1
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2012-1182Vendor Advisory
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:36.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2012:055",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.samba.org/samba/history/samba-3.6.4.html"
          },
          {
            "name": "SUSE-SU-2012:0501",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.samba.org/samba/security/CVE-2012-1182"
          },
          {
            "name": "48751",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48751"
          },
          {
            "name": "SUSE-SU-2012:0515",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html"
          },
          {
            "name": "DSA-2450",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2450"
          },
          {
            "name": "HPSBUX02789",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
          },
          {
            "name": "SUSE-SU-2012:0502",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html"
          },
          {
            "name": "48844",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48844"
          },
          {
            "name": "USN-1423-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1423-1"
          },
          {
            "name": "FEDORA-2012-5793",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html"
          },
          {
            "name": "FEDORA-2012-5805",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html"
          },
          {
            "name": "48816",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48816"
          },
          {
            "name": "FEDORA-2012-5843",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html"
          },
          {
            "name": "HPSBMU02790",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
          },
          {
            "name": "SUSE-SU-2012:0504",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html"
          },
          {
            "name": "48879",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48879"
          },
          {
            "name": "48754",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48754"
          },
          {
            "name": "FEDORA-2012-6382",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html"
          },
          {
            "name": "1026913",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026913"
          },
          {
            "name": "48818",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48818"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
          },
          {
            "name": "48999",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48999"
          },
          {
            "name": "SSRT100872",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5281"
          },
          {
            "name": "APPLE-SA-2012-05-09-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
          },
          {
            "name": "SSRT100824",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
          },
          {
            "name": "48873",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48873"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDVSA-2012:055",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.samba.org/samba/history/samba-3.6.4.html"
        },
        {
          "name": "SUSE-SU-2012:0501",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.samba.org/samba/security/CVE-2012-1182"
        },
        {
          "name": "48751",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48751"
        },
        {
          "name": "SUSE-SU-2012:0515",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html"
        },
        {
          "name": "DSA-2450",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2450"
        },
        {
          "name": "HPSBUX02789",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
        },
        {
          "name": "SUSE-SU-2012:0502",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html"
        },
        {
          "name": "48844",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48844"
        },
        {
          "name": "USN-1423-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1423-1"
        },
        {
          "name": "FEDORA-2012-5793",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html"
        },
        {
          "name": "FEDORA-2012-5805",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html"
        },
        {
          "name": "48816",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48816"
        },
        {
          "name": "FEDORA-2012-5843",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html"
        },
        {
          "name": "HPSBMU02790",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
        },
        {
          "name": "SUSE-SU-2012:0504",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html"
        },
        {
          "name": "48879",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48879"
        },
        {
          "name": "48754",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48754"
        },
        {
          "name": "FEDORA-2012-6382",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html"
        },
        {
          "name": "1026913",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026913"
        },
        {
          "name": "48818",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48818"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
        },
        {
          "name": "48999",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48999"
        },
        {
          "name": "SSRT100872",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5281"
        },
        {
          "name": "APPLE-SA-2012-05-09-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
        },
        {
          "name": "SSRT100824",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
        },
        {
          "name": "48873",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48873"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-1182",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2012:055",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055"
            },
            {
              "name": "http://www.samba.org/samba/history/samba-3.6.4.html",
              "refsource": "CONFIRM",
              "url": "http://www.samba.org/samba/history/samba-3.6.4.html"
            },
            {
              "name": "SUSE-SU-2012:0501",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html"
            },
            {
              "name": "https://www.samba.org/samba/security/CVE-2012-1182",
              "refsource": "CONFIRM",
              "url": "https://www.samba.org/samba/security/CVE-2012-1182"
            },
            {
              "name": "48751",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48751"
            },
            {
              "name": "SUSE-SU-2012:0515",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html"
            },
            {
              "name": "DSA-2450",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2450"
            },
            {
              "name": "HPSBUX02789",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
            },
            {
              "name": "SUSE-SU-2012:0502",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html"
            },
            {
              "name": "48844",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48844"
            },
            {
              "name": "USN-1423-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1423-1"
            },
            {
              "name": "FEDORA-2012-5793",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html"
            },
            {
              "name": "FEDORA-2012-5805",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html"
            },
            {
              "name": "48816",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48816"
            },
            {
              "name": "FEDORA-2012-5843",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html"
            },
            {
              "name": "HPSBMU02790",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
            },
            {
              "name": "SUSE-SU-2012:0504",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html"
            },
            {
              "name": "48879",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48879"
            },
            {
              "name": "48754",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48754"
            },
            {
              "name": "FEDORA-2012-6382",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html"
            },
            {
              "name": "1026913",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026913"
            },
            {
              "name": "48818",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48818"
            },
            {
              "name": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578",
              "refsource": "CONFIRM",
              "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
            },
            {
              "name": "48999",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48999"
            },
            {
              "name": "SSRT100872",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
            },
            {
              "name": "http://support.apple.com/kb/HT5281",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5281"
            },
            {
              "name": "APPLE-SA-2012-05-09-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
            },
            {
              "name": "SSRT100824",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
            },
            {
              "name": "48873",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48873"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1182",
    "datePublished": "2012-04-10T21:00:00",
    "dateReserved": "2012-02-14T00:00:00",
    "dateUpdated": "2024-08-06T18:53:36.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-1182\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-04-10T21:55:02.203\",\"lastModified\":\"2018-10-30T16:25:59.730\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.\"},{\"lang\":\"es\",\"value\":\"El generador de c\u00f3digo RPC de Samba 3.x anteriores a 3.4.16, 3.5.x anteriores a 3.5.14, y 3.6.x anteriores a 3.6.4 no implementa la validaci\u00f3n de una longitud de array de una manera consistente con la validaci\u00f3n de la reserva de memoria del array, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada RPC modificada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.15\",\"matchCriteriaId\":\"936BF59B-7485-4097-89D4-684CB63678BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84FB25B-5EA5-48DC-B528-E8CCF714C919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216145B7-4716-42F7-90DC-03884ECB2271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"898968E5-577E-4B86-A804-EBEC67157A61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8CE218B-E64D-41DC-8CFD-9387427B72CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"920EF846-41D1-429D-AF0F-3D7950F93069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8016DC4F-F410-4401-BDCC-91BE0D44D028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC94A2CF-85DF-4BB5-8F78-470A3454C3CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"632D2489-3B5E-466E-A6DF-1EF00303869B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FC116E5-B739-4E18-AA51-FFF59EBCA08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D40F682-9F2E-465F-98F7-23E1036C74A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9478CC84-802F-4960-ACAB-3700154E813F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BEA3806-E33A-49A6-99A4-095B4E543C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA7D08FB-30B9-4E42-B831-21A0C095062C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E6C8A4-FA17-44EF-A447-C73108540B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E05AD3-C7F0-421D-8C9B-604E553332E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A53517C-F12D-4D74-A722-5AE23598CEC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BF4A0A7-E176-4009-BAA2-E23B330D91A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2CDC66-8A44-4BEE-9574-FC69C38295A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42EB6115-CC45-4464-8400-D7E3A9402803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58B06DAF-869F-481B-965D-70353581A6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F0E277-09BD-4FA8-B2A3-7E83AD1656BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F260B05-3963-49BF-9D96-EB06722C5483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F002F105-A911-4E56-8630-C287DC527E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD55F6B-F753-41FC-8701-78A7DA556E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B63F362-A49C-401F-BE49-C6E1DC03E4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1936E19-9887-4E53-AA0C-738ABD4B97EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2206C09-6A4B-4EC4-A206-E48EDF966913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B918306-8743-404D-A035-CC3997ADCC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F23C27-76CF-4906-B829-3B4F2E07900E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6C8992-5210-483E-9EED-B7FC1EACA703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF9C0EA-173A-4B02-9933-09DFAC31398D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43684906-D3AA-40FB-A75D-ED65C1DC9BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E39538-4811-49DB-97CF-1F018C58BAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85D69FE-AF43-4B0E-A7A9-2D2C16426180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86347948-C08F-4F02-89A0-4F4A55CD4BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"D87FDC2E-C6D9-4D10-BED6-B10C40232DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90CE26E-8993-49BA-91BF-536DBC44CAD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A9C2ED-355B-4903-ABC3-23C85B494053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"375BCF42-1A8A-4ACB-8198-FEA471A81B76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA7905C-51A0-4A56-A6A5-330288613055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE85033-0658-4D60-8C7A-6E2BD63AFDCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4600AAA4-834D-4F63-8E9A-88CB555C029E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BFA3B82-9440-49E1-8088-FA22C0B7DD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0762B1DA-7232-478D-805F-5E2A50F8BEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C6E9D6-2964-4D63-9FCB-B4A02CC21975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C1CA41-DBEF-46D7-9A94-930315BECACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6804F20-3B33-4FAA-ACC3-9658FF0770D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F22FC74-5999-4158-A253-674BF1C21E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEB31C4-5352-4905-8D9E-BD754991F07E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BE2AEC-6ACD-422C-AD20-6C034D68C891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"101163D7-D440-43CC-8704-A9614CD8CEE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E4811D-3387-4838-94A0-1BD7F3C9C3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B69EA9CF-627C-4600-B4EC-10E91DB07E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99A8D6D8-A207-498F-8DB2-EB7ED842CE1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70BB5BA1-F499-40FC-80F6-B3CD2F1BB074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A973443-C497-41FB-AF47-529AA2906CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"49684CD5-4256-47CA-84BC-E319D8973314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42F2EB0A-249D-4E81-B459-A88AC60A1D39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEA8397-6E23-49FE-9555-39C9599C6362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023C2353-750A-42FC-AC7E-115627E74AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28A8721-CA4A-44E1-B740-0B4610374CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93572BB-7F00-4137-A079-6FE96CD73F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B843321-9A8D-4541-9E54-58E2978E2437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF36A20-3607-43A8-A4CC-169922BC0327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB71265E-60C4-4495-8B66-360E96B76FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC56F11D-20DE-4399-AED1-DF42C7E62F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44746973-3CFD-4808-9545-755E296EFF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E4627C-5D19-4599-B304-D0E4D4193170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE162A7-969D-44D5-B9ED-764F20F19C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28DF45AE-DF03-4321-A019-D3BBC16433B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D87AD2-89F2-455F-916E-D404E6BD02C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6218AB51-DE71-40F3-8CBC-AF33586D36EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02F8427-0DCC-48A9-A04F-939571D511E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC8A9943-6949-4B0A-9864-8B4696704098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4970BB40-085C-4069-B6F1-7E3726F1CFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA43C063-EBE1-4C61-9C9E-C84C3A594A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6962B6DA-5D78-4702-9546-216971D03F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39FAD067-8547-41E7-B1BC-74CC55D58AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787C3CBF-5E4E-4727-950A-D99F15327CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4B0684-FDCC-4EE8-AABA-F71204167C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7172A430-F124-4200-88C2-8BE486BA5DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EB9DC7-A196-48ED-893B-733E8CDA961F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D03508-3D54-4D05-A5BC-6F8641B45C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B0E09D3-68FA-40C9-A478-53707E5F78BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66D41850-968D-431D-8075-EE9EFF013408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"873A4A35-2CB0-4D55-B455-19D892776293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6680FCFB-CD17-4B4E-B523-A9D969D5F1BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"254D9460-899D-4D06-AC47-1914A42FC09A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60CED3E-B7A6-4674-ADD5-A3B047C7D125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07906A18-FD60-42A5-AC17-21F677EA1762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFC3F99-11F6-496E-BF55-53CF1E012FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C78E2B3A-10C4-4226-A224-8D4AC792B2F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFFCF854-E316-442F-A62F-ACC1CA4E9892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43FE147E-B1D1-4BC2-ACC0-85F39674C064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A63AC0-2B68-46A8-AD96-657C99463E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BD30B7-E182-402B-BE72-6C82DC085872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0C00E2-AD14-46A1-A695-FFE81547303B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4633D2E-2CBE-4B92-AD35-ED57C5399ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F200FC8-DA2E-4D39-8FF7-423759307DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B7341D-B02F-405B-81A0-5F74CFA8F8E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E207B352-D8F8-4E15-9507-D3AD10D56211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F01226-D9E6-460C-975A-618932D5F16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD98764-741C-4FED-BE4D-446E8E8D31F9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5900E6E-4379-4321-B69D-F9FBD341ACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C56B31-4495-4974-A47F-7D18734C9B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC8C2E40-DA05-4B50-AB29-398AF71EBECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5E81ED-032F-42B7-9D50-15CADE337AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDD90A4-B50B-4640-ADDE-B75BBC34507C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFC3804-991A-4BAF-818E-E321DB21FB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE1B4D9-507A-43B2-81F3-77E411ABEF7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857FCD47-F720-4273-BF1D-D5DC95ECA6D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8FE4AC-6E71-44CF-902D-BACA830C4CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EE762A-F95F-42CF-BB80-B0EF81A438EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738095D8-8ACE-4CF4-9D97-4228FC686F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D4634FC-DA4E-4B1D-B1AB-A45D8235780D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA83A66-BD39-4560-8EAF-ADF2433EF36D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66999F57-FF99-419F-BB12-35DC79FCE945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD1356E-3B43-4C5B-9969-902440918EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7F3209-B376-490B-A761-2CCB6CEE209A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"406C2297-B58D-4623-9E7A-2C438ABBAC93\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48754\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48816\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48818\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48844\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48873\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48879\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48999\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2450\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:055\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.samba.org/samba/history/samba-3.6.4.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1026913\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1423-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.samba.org/samba/security/CVE-2012-1182\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.