Show filters
252 Total Results
Displaying 141-150 of 252
Sort by:
Attacker Value
Unknown
CVE-2014-0244
Disclosure Date: June 23, 2014 (last updated October 05, 2023)
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
0
Attacker Value
Unknown
CVE-2014-0178
Disclosure Date: May 28, 2014 (last updated October 05, 2023)
Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
0
Attacker Value
Unknown
CVE-2014-0239
Disclosure Date: May 28, 2014 (last updated October 05, 2023)
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
0
Attacker Value
Unknown
CVE-2014-2855
Disclosure Date: April 23, 2014 (last updated October 05, 2023)
The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
0
Attacker Value
Unknown
CVE-2013-6442
Disclosure Date: March 14, 2014 (last updated October 05, 2023)
The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
0
Attacker Value
Unknown
CVE-2013-4496
Disclosure Date: March 14, 2014 (last updated October 05, 2023)
Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
0
Attacker Value
Unknown
CVE-2013-4408
Disclosure Date: December 03, 2013 (last updated October 05, 2023)
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
0
Attacker Value
Unknown
CVE-2012-6150
Disclosure Date: December 03, 2013 (last updated October 05, 2023)
The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
0
Attacker Value
Unknown
CVE-2013-4476
Disclosure Date: November 13, 2013 (last updated October 05, 2023)
Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
0
Attacker Value
Unknown
CVE-2013-4475
Disclosure Date: November 13, 2013 (last updated October 05, 2023)
Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
0