Show filters
252 Total Results
Displaying 111-120 of 252
Sort by:
Attacker Value
Unknown

CVE-2017-17434

Disclosure Date: December 06, 2017 (last updated November 08, 2023)
The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.
0
Attacker Value
Unknown

CVE-2017-14746

Disclosure Date: November 27, 2017 (last updated November 26, 2024)
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
Attacker Value
Unknown

CVE-2017-15275

Disclosure Date: November 27, 2017 (last updated November 26, 2024)
Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
Attacker Value
Unknown

CVE-2017-16548

Disclosure Date: November 06, 2017 (last updated November 08, 2023)
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
Attacker Value
Unknown

CVE-2017-15994

Disclosure Date: October 29, 2017 (last updated November 08, 2023)
rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
0
Attacker Value
Unknown

CVE-2017-11103

Disclosure Date: July 13, 2017 (last updated November 26, 2024)
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Attacker Value
Unknown

CVE-2017-9461

Disclosure Date: June 06, 2017 (last updated November 08, 2023)
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
0
Attacker Value
Unknown

CVE-2016-2126

Disclosure Date: May 11, 2017 (last updated November 26, 2024)
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Attacker Value
Unknown

CVE-2016-2119

Disclosure Date: July 07, 2016 (last updated November 25, 2024)
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
Attacker Value
Unknown

CVE-2016-2112

Disclosure Date: April 25, 2016 (last updated November 25, 2024)
The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
0