FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  375358
Date:      2014-12-23
Time:      21:24:55Z
Committer: rea

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0fa15e08-92ec-11e1-a94a-00215c6a37bbsamba -- incorrect permission checks vulnerability

The Samba project reports:

Samba versions 3.4.x to 3.6.4 inclusive are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.

Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database.

This is a serious error, as it means that authenticated users can connect to the LSA and grant themselves the "take ownership" privilege. This privilege is used by the smbd file server to grant the ability to change ownership of a file or directory which means users could take ownership of files or directories they do not own.


Discovery 2012-04-30
Entry 2012-04-30
samba34
gt 3.4.* lt 3.4.17

samba35
gt 3.5.* lt 3.5.15

samba36
gt 3.6.* lt 3.6.5

CVE-2012-2111
baf37cd2-8351-11e1-894e-00215c6a37bbsamba -- "root" credential remote code execution

Samba development team reports:

Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user from an anonymous connection.

As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.


Discovery 2012-04-10
Entry 2012-04-10
samba34
gt 3.4.* lt 3.4.16

samba35
gt 3.5.* lt 3.5.14

samba36
gt 3.6.* lt 3.6.4

CVE-2012-1182
baf37cd2-8351-11e1-894e-00215c6a37bbsamba -- "root" credential remote code execution

Samba development team reports:

Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user from an anonymous connection.

As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.


Discovery 2012-04-10
Entry 2012-04-10
samba34
gt 3.4.* lt 3.4.16

samba35
gt 3.5.* lt 3.5.14

samba36
gt 3.6.* lt 3.6.4

CVE-2012-1182
0fa15e08-92ec-11e1-a94a-00215c6a37bbsamba -- incorrect permission checks vulnerability

The Samba project reports:

Samba versions 3.4.x to 3.6.4 inclusive are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.

Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database.

This is a serious error, as it means that authenticated users can connect to the LSA and grant themselves the "take ownership" privilege. This privilege is used by the smbd file server to grant the ability to change ownership of a file or directory which means users could take ownership of files or directories they do not own.


Discovery 2012-04-30
Entry 2012-04-30
samba34
gt 3.4.* lt 3.4.17

samba35
gt 3.5.* lt 3.5.15

samba36
gt 3.6.* lt 3.6.5

CVE-2012-2111