CVE-2017-9461
- EPSS 4.03%
- Veröffentlicht 06.06.2017 21:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
- EPSS 94.24%
- Veröffentlicht 30.05.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
CVE-2016-2126
- EPSS 3.25%
- Veröffentlicht 11.05.2017 14:29:58
- Zuletzt bearbeitet 20.04.2025 01:37:25
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerbero...
CVE-2016-2119
- EPSS 0.8%
- Veröffentlicht 07.07.2016 15:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSI...
CVE-2016-2115
- EPSS 23.27%
- Veröffentlicht 25.04.2016 00:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
CVE-2016-2114
- EPSS 8.89%
- Veröffentlicht 25.04.2016 00:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client...
CVE-2016-2112
- EPSS 18.1%
- Veröffentlicht 25.04.2016 00:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade att...
CVE-2016-2113
- EPSS 2.39%
- Veröffentlicht 25.04.2016 00:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certific...
CVE-2016-2111
- EPSS 5.16%
- Veröffentlicht 25.04.2016 00:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive sessi...
CVE-2016-2110
- EPSS 16.94%
- Veröffentlicht 25.04.2016 00:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove app...