3.6

CVE-2012-6150

Exploit

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SambaSamba Version >= 3.3.10 < 3.4.0
SambaSamba Version >= 3.4.3 < 3.6.22
SambaSamba Version >= 4.0.0 < 4.0.13
SambaSamba Version >= 4.1.0 < 4.1.3
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.04
CanonicalUbuntu Linux Version13.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.36
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 3.6 3.9 4.9
AV:N/AC:H/Au:S/C:P/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://marc.info/?l=bugtraq&m=141660010015249&w=2
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2013/12/03/5
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=1036897
Third Party Advisory
Issue Tracking
https://bugzilla.samba.org/show_bug.cgi?id=10300
Patch
Third Party Advisory
Issue Tracking