FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

nothing found there

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
613e45d1-6154-11e3-9b62-000c292e4fd8samba -- multiple vulnerabilities

The Samba project reports:

These are security releases in order to address CVE-2013-4408 (DCE-RPC fragment length field is incorrectly checked) and CVE-2012-6150 (pam_winbind login without require_membership_of restrictions).


Discovery 2012-06-12
Entry 2013-12-11
samba34
gt 0

samba35
gt 0

samba36
gt 3.6.* lt 3.6.22

samba4
gt 4.0.* lt 4.0.13

samba41
gt 4.1.* lt 4.1.3

CVE-2012-6150
CVE-2013-4408
http://www.samba.org/samba/security/CVE-2012-6150
http://www.samba.org/samba/security/CVE-2013-4408
56f4b3a6-c82c-11e0-a498-00215c6a37bbSamba -- cross site scripting and request forgery vulnerabilities

Samba security advisory reports:

All current released versions of Samba are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT.

All current released versions of Samba are vulnerable to a cross-site scripting issue in the Samba Web Administration Tool (SWAT). On the "Change Password" field, it is possible to insert arbitrary content into the "user" field.


Discovery 2011-07-27
Entry 2011-08-16
samba34
gt 3.4.* lt 3.4.14

samba35
gt 3.5.* lt 3.5.10

48901
48899
CVE-2011-2522
CVE-2011-2694
a4f08579-516c-11e3-9b62-000c292e4fd8samba -- ACLs are not checked on opening an alternate data stream on a file or directory

The Samba project reports:

Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x, 3.4.x, 3.5.x, 3.6.x, 4.0.x and 4.1.x) do not check the underlying file or directory ACL when opening an alternate data stream.

According to the SMB1 and SMB2+ protocols the ACL on an underlying file or directory should control what access is allowed to alternate data streams that are associated with the file or directory.


Discovery 2013-06-12
Entry 2013-11-19
samba34
gt 0

samba35
gt 0

samba36
gt 3.6.* lt 3.6.20

samba4
gt 4.0.* lt 4.0.11

samba41
gt 4.1.* lt 4.1.1

CVE-2013-4475
http://www.samba.org/samba/security/CVE-2013-4475
0fa15e08-92ec-11e1-a94a-00215c6a37bbsamba -- incorrect permission checks vulnerability

The Samba project reports:

Samba versions 3.4.x to 3.6.4 inclusive are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.

Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database.

This is a serious error, as it means that authenticated users can connect to the LSA and grant themselves the "take ownership" privilege. This privilege is used by the smbd file server to grant the ability to change ownership of a file or directory which means users could take ownership of files or directories they do not own.


Discovery 2012-04-30
Entry 2012-04-30
samba34
gt 3.4.* lt 3.4.17

samba35
gt 3.5.* lt 3.5.15

samba36
gt 3.6.* lt 3.6.5

CVE-2012-2111
e21c7c7a-0116-11e3-9e83-3c970e169bc2samba -- denial of service vulnerability

The Samba project reports:

All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service.

A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed.


Discovery 2013-08-05
Entry 2013-08-09
Modified 2013-08-09
samba34
gt 0

samba35
gt 0

samba36
gt 3.6.* lt 3.6.17

samba4
gt 4.0.* lt 4.0.8

CVE-2013-4124
http://www.samba.org/samba/security/CVE-2013-4124
bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41Samba -- Denial of service - memory corruption

The Samba team reports:

Samba is vulnerable to a denial of service, caused by a memory corruption error related to missing range checks on file descriptors being used in the "FD_SET" macro. By performing a select on a bad file descriptor set, a remote attacker could exploit this vulnerability to cause the application to crash or possibly execute arbitrary code on the system.


Discovery 2011-02-28
Entry 2011-06-21
samba34
gt 3.4.* lt 3.4.12

samba35
gt 3.5.* lt 3.5.7

CVE-2011-0719
http://www.samba.org/samba/security/CVE-2011-0719.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719
baf37cd2-8351-11e1-894e-00215c6a37bbsamba -- "root" credential remote code execution

Samba development team reports:

Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user from an anonymous connection.

As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.


Discovery 2012-04-10
Entry 2012-04-10
samba34
gt 3.4.* lt 3.4.16

samba35
gt 3.5.* lt 3.5.14

samba36
gt 3.6.* lt 3.6.4

CVE-2012-1182
03e48bf5-a96d-11e3-a556-3c970e169bc2samba -- multiple vulnerabilities

Samba project reports:

In Samba's SAMR server we neglect to ensure that attempted password changes will update the bad password count, nor set the lockout flags. This would allow a user unlimited attempts against the password by simply calling ChangePasswordUser2 repeatedly.

This is available without any other authentication.

smbcacls can remove a file or directory ACL by mistake.


Discovery 2014-03-11
Entry 2014-03-11
samba34
gt 0

samba35
gt 0

samba36
gt 3.6.* lt 3.6.23

samba4
gt 4.0.* lt 4.0.16

samba41
gt 4.1.* lt 4.1.6

CVE-2013-4496
CVE-2013-6442
http://www.samba.org/samba/security/CVE-2013-4496
http://www.samba.org/samba/security/CVE-2013-6442