Show filters
252 Total Results
Displaying 41-50 of 252
Sort by:
Attacker Value
Unknown

CVE-2021-3670

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
MaxQueryDuration not honoured in Samba AD DC LDAP
Attacker Value
Unknown

CVE-2021-20316

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.
Attacker Value
Unknown

CVE-2022-29154

Disclosure Date: August 02, 2022 (last updated November 08, 2023)
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
Attacker Value
Unknown

CVE-2022-29869

Disclosure Date: April 28, 2022 (last updated October 07, 2023)
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
Attacker Value
Unknown

CVE-2022-27239

Disclosure Date: April 27, 2022 (last updated October 07, 2023)
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Attacker Value
Unknown

CVE-2020-25721

Disclosure Date: March 16, 2022 (last updated October 07, 2023)
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
Attacker Value
Unknown

CVE-2021-3738

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.
Attacker Value
Unknown

CVE-2021-23192

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
Attacker Value
Unknown

CVE-2021-44141

Disclosure Date: February 21, 2022 (last updated October 07, 2023)
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.
Attacker Value
Unknown

CVE-2020-25722

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.