VuXML ID | Description |
a4f08579-516c-11e3-9b62-000c292e4fd8 | samba -- ACLs are not checked on opening an alternate data stream on a file or directory
The Samba project reports:
Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x,
3.4.x, 3.5.x, 3.6.x, 4.0.x and 4.1.x) do not check the underlying
file or directory ACL when opening an alternate data stream.
According to the SMB1 and SMB2+ protocols the ACL on an underlying
file or directory should control what access is allowed to alternate
data streams that are associated with the file or directory.
Discovery 2013-06-12 Entry 2013-11-19 samba34
gt 0
samba35
gt 0
samba36
gt 3.6.* lt 3.6.20
samba4
gt 4.0.* lt 4.0.11
samba41
gt 4.1.* lt 4.1.1
CVE-2013-4475
http://www.samba.org/samba/security/CVE-2013-4475
|
0fa15e08-92ec-11e1-a94a-00215c6a37bb | samba -- incorrect permission checks vulnerability
The Samba project reports:
Samba versions 3.4.x to 3.6.4 inclusive are affected
by a vulnerability that allows arbitrary users to modify
privileges on a file server.
Security checks were incorrectly applied to the Local
Security Authority (LSA) remote proceedure calls (RPC)
CreateAccount, OpenAccount, AddAccountRights and
RemoveAccountRights allowing any authenticated user
to modify the privileges database.
This is a serious error, as it means that authenticated
users can connect to the LSA and grant themselves the
"take ownership" privilege. This privilege is used by the
smbd file server to grant the ability to change ownership
of a file or directory which means users could take ownership
of files or directories they do not own.
Discovery 2012-04-30 Entry 2012-04-30 samba34
gt 3.4.* lt 3.4.17
samba35
gt 3.5.* lt 3.5.15
samba36
gt 3.6.* lt 3.6.5
CVE-2012-2111
|
bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41 | Samba -- Denial of service - memory corruption
The Samba team reports:
Samba is vulnerable to a denial of service, caused by a memory
corruption error related to missing range checks on file
descriptors being used in the "FD_SET" macro. By performing a
select on a bad file descriptor set, a remote attacker could
exploit this vulnerability to cause the application to crash or
possibly execute arbitrary code on the system.
Discovery 2011-02-28 Entry 2011-06-21 samba34
gt 3.4.* lt 3.4.12
samba35
gt 3.5.* lt 3.5.7
CVE-2011-0719
http://www.samba.org/samba/security/CVE-2011-0719.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719
|
56f4b3a6-c82c-11e0-a498-00215c6a37bb | Samba -- cross site scripting and request forgery vulnerabilities
Samba security advisory reports:
All current released versions of Samba are vulnerable to a
cross-site request forgery in the Samba Web Administration Tool
(SWAT). By tricking a user who is authenticated with SWAT into
clicking a manipulated URL on a different web page, it is
possible to manipulate SWAT.
All current released versions of Samba are vulnerable to a
cross-site scripting issue in the Samba Web Administration Tool
(SWAT). On the "Change Password" field, it is possible to insert
arbitrary content into the "user" field.
Discovery 2011-07-27 Entry 2011-08-16 samba34
gt 3.4.* lt 3.4.14
samba35
gt 3.5.* lt 3.5.10
48901
48899
CVE-2011-2522
CVE-2011-2694
|
03e48bf5-a96d-11e3-a556-3c970e169bc2 | samba -- multiple vulnerabilities
Samba project reports:
In Samba's SAMR server we neglect to ensure that attempted
password changes will update the bad password count, nor set
the lockout flags. This would allow a user unlimited attempts
against the password by simply calling ChangePasswordUser2
repeatedly.
This is available without any other authentication.
smbcacls can remove a file or directory ACL by mistake.
Discovery 2014-03-11 Entry 2014-03-11 samba34
gt 0
samba35
gt 0
samba36
gt 3.6.* lt 3.6.23
samba4
gt 4.0.* lt 4.0.16
samba41
gt 4.1.* lt 4.1.6
CVE-2013-4496
CVE-2013-6442
http://www.samba.org/samba/security/CVE-2013-4496
http://www.samba.org/samba/security/CVE-2013-6442
|
baf37cd2-8351-11e1-894e-00215c6a37bb | samba -- "root" credential remote code execution
Samba development team reports:
Samba versions 3.6.3 and all versions previous to this
are affected by a vulnerability that allows remote code
execution as the "root" user from an anonymous connection.
As this does not require an authenticated connection it
is the most serious vulnerability possible in a program,
and users and vendors are encouraged to patch their Samba
installations immediately.
Discovery 2012-04-10 Entry 2012-04-10 samba34
gt 3.4.* lt 3.4.16
samba35
gt 3.5.* lt 3.5.14
samba36
gt 3.6.* lt 3.6.4
CVE-2012-1182
|
e21c7c7a-0116-11e3-9e83-3c970e169bc2 | samba -- denial of service vulnerability
The Samba project reports:
All current released versions of Samba are vulnerable to
a denial of service on an authenticated or guest connection.
A malformed packet can cause the smbd server to loop the CPU
performing memory allocations and preventing any further service.
A connection to a file share, or a local account is needed
to exploit this problem, either authenticated or unauthenticated
if guest connections are allowed.
Discovery 2013-08-05 Entry 2013-08-09 Modified 2013-08-09 samba34
gt 0
samba35
gt 0
samba36
gt 3.6.* lt 3.6.17
samba4
gt 4.0.* lt 4.0.8
CVE-2013-4124
http://www.samba.org/samba/security/CVE-2013-4124
|
613e45d1-6154-11e3-9b62-000c292e4fd8 | samba -- multiple vulnerabilities
The Samba project reports:
These are security releases in order to address CVE-2013-4408
(DCE-RPC fragment length field is incorrectly checked) and CVE-2012-6150
(pam_winbind login without require_membership_of restrictions).
Discovery 2012-06-12 Entry 2013-12-11 samba34
gt 0
samba35
gt 0
samba36
gt 3.6.* lt 3.6.22
samba4
gt 4.0.* lt 4.0.13
samba41
gt 4.1.* lt 4.1.3
CVE-2012-6150
CVE-2013-4408
http://www.samba.org/samba/security/CVE-2012-6150
http://www.samba.org/samba/security/CVE-2013-4408
|