Samba

Samba

211 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 05.05.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:46:13

A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negativ...

  • EPSS 0.19%
  • Veröffentlicht 03.12.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:02:59

A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.

  • EPSS 0.27%
  • Veröffentlicht 02.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:08

A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticate...

  • EPSS 21.75%
  • Veröffentlicht 11.11.2020 07:15:16
  • Zuletzt bearbeitet 21.11.2024 05:07:42

A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD). To exploit the vulnerability, a compromised service that is c...

  • EPSS 0.42%
  • Veröffentlicht 29.10.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:03:00

A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.

Warnung Exploit
  • EPSS 94.43%
  • Veröffentlicht 17.08.2020 19:15:15
  • Zuletzt bearbeitet 07.03.2025 14:57:32

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability...

  • EPSS 16.33%
  • Veröffentlicht 07.07.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:58

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denia...

  • EPSS 2.76%
  • Veröffentlicht 07.07.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:55:56

A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in ...

  • EPSS 2.55%
  • Veröffentlicht 06.07.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:00

A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.

  • EPSS 26.12%
  • Veröffentlicht 06.07.2020 18:15:20
  • Zuletzt bearbeitet 21.11.2024 05:02:57

A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.