cve-2014-3493
Vulnerability from cvelistv5
Published
2014-06-23 14:00
Modified
2024-08-06 10:43
Severity ?
Summary
The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0279.html
secalert@redhat.comhttp://linux.oracle.com/errata/ELSA-2014-0866.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0866.html
secalert@redhat.comhttp://secunia.com/advisories/59378
secalert@redhat.comhttp://secunia.com/advisories/59407
secalert@redhat.comhttp://secunia.com/advisories/59433
secalert@redhat.comhttp://secunia.com/advisories/59579
secalert@redhat.comhttp://secunia.com/advisories/59834
secalert@redhat.comhttp://secunia.com/advisories/59848
secalert@redhat.comhttp://secunia.com/advisories/59919
secalert@redhat.comhttp://secunia.com/advisories/61218
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:136
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2014-3493Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/532757/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/68150
secalert@redhat.comhttp://www.securitytracker.com/id/1030455
secalert@redhat.comhttps://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1108748
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:43:06.156Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
          },
          {
            "name": "MDVSA-2014:136",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
          },
          {
            "name": "RHSA-2014:0866",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
          },
          {
            "name": "FEDORA-2014-9132",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
          },
          {
            "name": "61218",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61218"
          },
          {
            "name": "59834",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59834"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
          },
          {
            "name": "59848",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59848"
          },
          {
            "name": "20140711 [ MDVSA-2014:136 ] samba",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
          },
          {
            "name": "GLSA-201502-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
          },
          {
            "name": "68150",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68150"
          },
          {
            "name": "59407",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59407"
          },
          {
            "name": "FEDORA-2014-7672",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
          },
          {
            "name": "59433",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59433"
          },
          {
            "name": "59919",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59919"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
          },
          {
            "name": "59378",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59378"
          },
          {
            "name": "MDVSA-2015:082",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
          },
          {
            "name": "59579",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59579"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.samba.org/samba/security/CVE-2014-3493"
          },
          {
            "name": "1030455",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030455"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
        },
        {
          "name": "MDVSA-2014:136",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
        },
        {
          "name": "RHSA-2014:0866",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
        },
        {
          "name": "FEDORA-2014-9132",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
        },
        {
          "name": "61218",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61218"
        },
        {
          "name": "59834",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59834"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
        },
        {
          "name": "59848",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59848"
        },
        {
          "name": "20140711 [ MDVSA-2014:136 ] samba",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
        },
        {
          "name": "GLSA-201502-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
        },
        {
          "name": "68150",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68150"
        },
        {
          "name": "59407",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59407"
        },
        {
          "name": "FEDORA-2014-7672",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
        },
        {
          "name": "59433",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59433"
        },
        {
          "name": "59919",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59919"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
        },
        {
          "name": "59378",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59378"
        },
        {
          "name": "MDVSA-2015:082",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
        },
        {
          "name": "59579",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59579"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.samba.org/samba/security/CVE-2014-3493"
        },
        {
          "name": "1030455",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030455"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-3493",
    "datePublished": "2014-06-23T14:00:00",
    "dateReserved": "2014-05-14T00:00:00",
    "dateUpdated": "2024-08-06T10:43:06.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-3493\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-06-23T14:55:05.357\",\"lastModified\":\"2023-02-13T00:39:49.877\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n push_ascii en smbd en Samba 3.6.x anterior a 3.6.24, 4.0.x anterior a 4.0.19 y 4.1.x anterior a 4.1.9 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de demonio) a trav\u00e9s de in intento de leer un nombre de ruta Unicode sin especificar el uso de Unicode, que conduce a un fallo de conversi\u00f3n de configuraci\u00f3n de car\u00e1cter que provoca una referencia a puntero inv\u00e1lida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:S/C:N/I:N/A:P\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":2.7},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":5.1,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66999F57-FF99-419F-BB12-35DC79FCE945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD1356E-3B43-4C5B-9969-902440918EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7F3209-B376-490B-A761-2CCB6CEE209A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"406C2297-B58D-4623-9E7A-2C438ABBAC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6AF0DD4-08D4-4726-8A12-E979FF3322B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3DAE05B-9086-4702-9586-77B34399E1EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA544013-8FAC-4452-9D38-081C514E2981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DE15C9-3308-4DE0-8048-9B06AF4D7343\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CB4968-F331-4653-8B9F-75BA4BB7A6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3470D075-CCF2-42A1-A8C9-E375FC05FF47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA72F88-6799-4E6C-B73C-C92616B04661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7FA486-73CE-4226-86C6-DA8383C5578F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17D2B72-19E2-4DE6-B1E3-F1823E2690BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC6922A-03CD-484A-BF40-F8F937428062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8470C251-2874-4047-A759-F8D5C6D5C755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332308A1-4BA4-4BC7-8B4B-7463CF98B664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455B73D1-E8F1-478C-8CEB-79E4B5F33A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AC49023-CAD6-4875-BF94-EEC290E8A5A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42BFAF8-5822-4782-B60D-BCB131834419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B8A690-81D0-40C4-9301-CF1992C2DA0E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB9C10B-284E-48CD-A524-1A6BF828AED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70DD815-1DAA-4025-8C97-32C7D06D8AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C33F47-0F28-4AE2-A895-82B5E0F4496D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EEFF35-E903-4651-A4B4-D92FF26A7509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44BD172-80FA-4260-BAFB-251A95E8C7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09116D2-F168-4305-9A1D-88A1D42739A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"558E0B71-F79E-47B5-90CC-9C165BB15507\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2855B3F6-49B6-4D25-BEAC-4D1797D1E100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1F1993-70A2-4104-85AF-3BECB330AB24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E955458C-8F5C-4D55-9F78-9E1CB4416F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"866FF7AC-19EA-49E7-B423-9FF57839B580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A1A64C7-B039-4724-B06C-EAC898EB3B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C572E25A-4B44-426D-B637-292A08766D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D96D806-ED52-4010-9F5F-F84E33C245D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643FC7D2-FC39-43FA-99E6-805553FE1DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B95519-0C9D-473C-912D-E350106DC4CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC603E1A-7882-45F0-9E8D-157F191C0FD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F9321C-B442-4081-8E4A-62BAD95239A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012A397B-004D-489C-B06D-C0D67E26B1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392E0C61-7718-4DBC-8F02-6F3C2CBE1783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324AE9D7-C41F-493E-A1AD-FCD869D29D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68519B1F-F315-4BBD-A4A3-4E1956D81E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF745E93-A92E-4AD7-8D42-36E9387C6915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E4B760-417E-45D1-9CE1-AEBC8936BDA6\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0279.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-0866.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0866.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59378\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59407\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59433\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59579\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59834\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59848\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59919\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61218\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201502-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:136\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:082\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.samba.org/samba/security/CVE-2014-3493\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/532757/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/68150\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1030455\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1108748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.