FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  363620
Date:      2014-07-31
Time:      15:23:47Z
Committer: rakuco

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
a63b15f9-97ff-11dc-9e48-0016179b2dd5samba -- multiple vulnerabilities

The Samba Team reports:

Secunia Research reported a vulnerability that allows for the execution of arbitrary code in nmbd. This defect may only be exploited when the "wins support" parameter has been enabled in smb.conf.

Samba developers have discovered what is believed to be a non-exploitable buffer over in nmbd during the processing of GETDC logon server requests. This code is only used when the Samba server is configured as a Primary or Backup Domain Controller.


Discovery 2007-11-15
Entry 2007-11-21
Modified 2008-09-26
samba
samba3
ja-samba
lt 3.0.26a

gt *,1 lt 3.0.26a_2,1

26454
CVE-2007-4572
CVE-2007-5398
http://secunia.com/advisories/27450/
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://us1.samba.org/samba/security/CVE-2007-5398.html
a63b15f9-97ff-11dc-9e48-0016179b2dd5samba -- multiple vulnerabilities

The Samba Team reports:

Secunia Research reported a vulnerability that allows for the execution of arbitrary code in nmbd. This defect may only be exploited when the "wins support" parameter has been enabled in smb.conf.

Samba developers have discovered what is believed to be a non-exploitable buffer over in nmbd during the processing of GETDC logon server requests. This code is only used when the Samba server is configured as a Primary or Backup Domain Controller.


Discovery 2007-11-15
Entry 2007-11-21
Modified 2008-09-26
samba
samba3
ja-samba
lt 3.0.26a

gt *,1 lt 3.0.26a_2,1

26454
CVE-2007-4572
CVE-2007-5398
http://secunia.com/advisories/27450/
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://us1.samba.org/samba/security/CVE-2007-5398.html
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72samba -- buffer overflow vulnerability

Secuna Research reports:

Secunia Research has discovered a vulnerability in Samba, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the "send_mailslot()" function. This can be exploited to cause a stack-based buffer overflow with zero bytes via a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string. Successful exploitation allows execution of arbitrary code, but requires that the "domain logons" option is enabled.


Discovery 2007-12-10
Entry 2007-12-12
Modified 2008-09-26
samba
samba3
ja-samba
lt 3.0.28

gt *,1 lt 3.0.28,1

CVE-2007-6015
http://secunia.com/advisories/27760/
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72samba -- buffer overflow vulnerability

Secuna Research reports:

Secunia Research has discovered a vulnerability in Samba, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the "send_mailslot()" function. This can be exploited to cause a stack-based buffer overflow with zero bytes via a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string. Successful exploitation allows execution of arbitrary code, but requires that the "domain logons" option is enabled.


Discovery 2007-12-10
Entry 2007-12-12
Modified 2008-09-26
samba
samba3
ja-samba
lt 3.0.28

gt *,1 lt 3.0.28,1

CVE-2007-6015
http://secunia.com/advisories/27760/
3b3676be-52e1-11d9-a9e7-0001020eed82samba -- integer overflow vulnerability

Greg MacManus, iDEFENSE Labs reports:

Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.

Successful remote exploitation allows an attacker to gain root privileges on a vulnerable system. In order to exploit this vulnerability an attacker must possess credentials that allow access to a share on the Samba server. Unsuccessful exploitation attempts will cause the process serving the request to crash with signal 11, and may leave evidence of an attack in logs.


Discovery 2004-12-02
Entry 2004-12-21
Modified 2008-09-26
samba
lt 3.0.10

gt *,1 lt 3.0.10,1

ja-samba
lt 2.2.12.j1.0beta1_2

gt 3.* lt 3.0.10

gt 3.*,1 lt 3.0.10,1

CVE-2004-1154
http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
http://www.samba.org/samba/security/CAN-2004-1154.html
3b3676be-52e1-11d9-a9e7-0001020eed82samba -- integer overflow vulnerability

Greg MacManus, iDEFENSE Labs reports:

Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.

Successful remote exploitation allows an attacker to gain root privileges on a vulnerable system. In order to exploit this vulnerability an attacker must possess credentials that allow access to a share on the Samba server. Unsuccessful exploitation attempts will cause the process serving the request to crash with signal 11, and may leave evidence of an attack in logs.


Discovery 2004-12-02
Entry 2004-12-21
Modified 2008-09-26
samba
lt 3.0.10

gt *,1 lt 3.0.10,1

ja-samba
lt 2.2.12.j1.0beta1_2

gt 3.* lt 3.0.10

gt 3.*,1 lt 3.0.10,1

CVE-2004-1154
http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
http://www.samba.org/samba/security/CAN-2004-1154.html