Show filters
236 Total Results
Displaying 51-60 of 236
Sort by:
Attacker Value
Unknown

CVE-2016-2124

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Attacker Value
Unknown

CVE-2020-25718

Disclosure Date: February 18, 2022 (last updated November 29, 2024)
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.
Attacker Value
Unknown

CVE-2021-43566

Disclosure Date: January 11, 2022 (last updated October 07, 2023)
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
Attacker Value
Unknown

CVE-2021-3671

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.
Attacker Value
Unknown

CVE-2020-27840

Disclosure Date: May 12, 2021 (last updated February 22, 2025)
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20277

Disclosure Date: May 12, 2021 (last updated February 22, 2025)
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20254

Disclosure Date: May 05, 2021 (last updated February 22, 2025)
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
Attacker Value
Unknown

CVE-2021-27185

Disclosure Date: February 10, 2021 (last updated February 22, 2025)
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
Attacker Value
Unknown

CVE-2020-14318

Disclosure Date: December 03, 2020 (last updated February 22, 2025)
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
Attacker Value
Unknown

CVE-2020-14383

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.