This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Samba First view 2013-08-05
Product Samba Last view 2022-01-11
Version 4.0.5 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:samba:samba

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
2.5 2022-01-11 CVE-2021-43566

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

6.5 2021-10-12 CVE-2021-3671

A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.

7.5 2021-05-12 CVE-2021-20277

A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.

7.5 2021-05-12 CVE-2020-27840

A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.

6.8 2021-05-05 CVE-2021-20254

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.

4.3 2020-12-03 CVE-2020-14318

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

6.5 2020-12-02 CVE-2020-14383

A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.

5.5 2020-10-29 CVE-2020-14323

A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.

10 2020-08-17 CVE-2020-1472

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.

7.5 2020-07-07 CVE-2020-10745

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

6.5 2020-07-07 CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.

7.5 2020-07-06 CVE-2020-14303

A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.

6.5 2020-07-06 CVE-2020-10760

A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.

7.5 2020-05-06 CVE-2020-10704

A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.

5.3 2020-05-04 CVE-2020-10700

A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.

6.5 2020-01-21 CVE-2019-19344

There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.

6.5 2020-01-21 CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

5.4 2020-01-21 CVE-2019-14902

There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.

5.4 2019-12-10 CVE-2019-14870

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

5.3 2019-12-10 CVE-2019-14861

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.

4.9 2019-11-06 CVE-2019-14847

A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.

5.4 2019-11-06 CVE-2019-14833

A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.

6.5 2019-11-06 CVE-2019-10218

A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.

9.1 2019-09-03 CVE-2019-10197

A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.

7.5 2019-07-31 CVE-2018-16860

A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
11% (9) CWE-476 NULL Pointer Dereference
7% (6) CWE-254 Security Features
7% (6) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (6) CWE-20 Improper Input Validation
6% (5) CWE-416 Use After Free
6% (5) CWE-264 Permissions, Privileges, and Access Controls
6% (5) CWE-125 Out-of-bounds Read
5% (4) CWE-200 Information Exposure
3% (3) CWE-310 Cryptographic Issues
3% (3) CWE-284 Access Control (Authorization) Issues
3% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
2% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (2) CWE-399 Resource Management Errors
2% (2) CWE-358 Improperly Implemented Security Check for Standard
2% (2) CWE-276 Incorrect Default Permissions
2% (2) CWE-189 Numeric Errors
2% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (1) CWE-674 Uncontrolled Recursion
1% (1) CWE-522 Insufficiently Protected Credentials
1% (1) CWE-415 Double Free
1% (1) CWE-362 Race Condition
1% (1) CWE-345 Insufficient Verification of Data Authenticity
1% (1) CWE-330 Use of Insufficiently Random Values
1% (1) CWE-305 Authentication Bypass by Primary Weakness
1% (1) CWE-285 Improper Access Control (Authorization)

SAINT Exploits

Description Link
Samba shared library upload and execution More info here

ExploitDB Exploits

id Description
27778 Samba nttrans Reply - Integer Overflow Vulnerability

Information Assurance Vulnerability Management (IAVM)

id Description
2015-B-0083 Multiple Vulnerabilities in IBM Storwize V7000 Unified
Severity: Category I - VMSKEY: V0060983
2015-A-0042 Samba Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0058919
2014-B-0105 Samba Remote Code Execution
Severity: Category I - VMSKEY: V0053637
2014-B-0067 Multiple Vulnerabilities in Samba
Severity: Category I - VMSKEY: V0051853
2013-B-0131 Multiple Vulnerabilities in Samba
Severity: Category I - VMSKEY: V0042303
2013-B-0082 Samba Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0039910

Snort® IPS/IDS

Date Description
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-10-22 Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin...
RuleID : 55802 - Type : OS-WINDOWS - Revision : 1
2020-10-20 Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil...
RuleID : 55704 - Type : OS-WINDOWS - Revision : 2
2020-10-20 Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil...
RuleID : 55703 - Type : OS-WINDOWS - Revision : 2
2019-02-04 Samba is_known_pipe arbitrary module load code execution attempt
RuleID : 49090-community - Type : SERVER-SAMBA - Revision : 1
2019-03-07 Samba is_known_pipe arbitrary module load code execution attempt
RuleID : 49090 - Type : SERVER-SAMBA - Revision : 1
2018-07-03 Possible Samba internal DNS forged response
RuleID : 46848 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-03-01 Samba LDAP Server libldb denial of service attempt
RuleID : 45568 - Type : SERVER-SAMBA - Revision : 3
2018-01-23 Samba tree connect andx memory corruption attempt
RuleID : 45255 - Type : SERVER-SAMBA - Revision : 2
2018-01-03 Samba unsigned connections attempt
RuleID : 45074 - Type : SERVER-SAMBA - Revision : 3
2018-01-03 Samba write command memory leak attempt
RuleID : 45072 - Type : SERVER-SAMBA - Revision : 2
2018-01-03 Samba write and unlock command memory leak attempt
RuleID : 45071 - Type : SERVER-SAMBA - Revision : 2
2018-01-03 Samba write and close command memory leak attempt
RuleID : 45070 - Type : SERVER-SAMBA - Revision : 2
2018-01-03 Samba write andx command memory leak attempt
RuleID : 45069 - Type : SERVER-SAMBA - Revision : 2
2017-07-04 Samba LDAP modify dnsRecord buffer overflow attempt
RuleID : 43053 - Type : SERVER-SAMBA - Revision : 1
2017-05-25 Samba is_known_pipe arbitrary module load code execution attempt
RuleID : 43004-community - Type : SERVER-SAMBA - Revision : 5
2017-06-27 Samba is_known_pipe arbitrary module load code execution attempt
RuleID : 43004 - Type : SERVER-SAMBA - Revision : 5
2015-04-14 Samba smbd _netr_ServerPasswordSet deprecated vulnerable function access attempt
RuleID : 33826 - Type : SERVER-SAMBA - Revision : 3

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing one or more security updates.
File: fedora_2018-bc22d6c7bc.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-c2a93f8e1b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-e423e8743f.nasl - Type: ACT_GATHER_INFO
2018-12-20 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1126.nasl - Type: ACT_GATHER_INFO
2018-12-17 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3056.nasl - Type: ACT_GATHER_INFO
2018-12-17 Name: The remote Debian host is missing a security update.
File: debian_DLA-1607.nasl - Type: ACT_GATHER_INFO
2018-11-29 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-333-01.nasl - Type: ACT_GATHER_INFO
2018-11-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4345.nasl - Type: ACT_GATHER_INFO
2018-11-28 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_54976998f24811e881e2005056a311d1.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2789.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2791.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1238.nasl - Type: ACT_GATHER_INFO
2018-08-22 Name: The remote Fedora host is missing a security update.
File: fedora_2018-8e4d871867.nasl - Type: ACT_GATHER_INFO
2018-08-20 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-229-02.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4271.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_c4e9a4279fc211e8802a000c29a1e3ec.nasl - Type: ACT_GATHER_INFO
2018-05-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201805-07.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-791c5d52be.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-f0c18420e8.nasl - Type: ACT_GATHER_INFO
2017-12-26 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-933.nasl - Type: ACT_GATHER_INFO
2017-12-14 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1315.nasl - Type: ACT_GATHER_INFO
2017-12-14 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1316.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1314.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1315.nasl - Type: ACT_GATHER_INFO
2017-12-01 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-3155-1.nasl - Type: ACT_GATHER_INFO