Show filters
236 Total Results
Displaying 41-50 of 236
Sort by:
Attacker Value
Unknown

CVE-2021-20316

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.
Attacker Value
Unknown

CVE-2022-25620

Disclosure Date: March 30, 2022 (last updated October 07, 2023)
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Group Functionality of Profelis IT Consultancy SambaBox allows AUTHENTICATED user to cause execute arbitrary codes on the vulnerable server. This issue affects: Profelis IT Consultancy SambaBox 4.0 version 4.0 and prior versions on x86.
Attacker Value
Unknown

CVE-2022-25619

Disclosure Date: March 30, 2022 (last updated October 07, 2023)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in ping tool of Profelis IT Consultancy SambaBox allows AUTHENTICATED user to cause run arbitrary code. This issue affects: Profelis IT Consultancy SambaBox 4.0 version 4.0 and prior versions on x86.
Attacker Value
Unknown

CVE-2020-25721

Disclosure Date: March 16, 2022 (last updated October 07, 2023)
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
Attacker Value
Unknown

CVE-2021-3738

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.
Attacker Value
Unknown

CVE-2021-23192

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Attacker Value
Unknown

CVE-2021-44141

Disclosure Date: February 21, 2022 (last updated October 07, 2023)
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.
Attacker Value
Unknown

CVE-2020-25722

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.
Attacker Value
Unknown

CVE-2020-25719

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
Attacker Value
Unknown

CVE-2020-25717

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.