Samba

Samba

211 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.03%
  • Published 06.06.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.

Warning
  • EPSS 94.24%
  • Published 30.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.

  • EPSS 3.25%
  • Published 11.05.2017 14:29:58
  • Last modified 20.04.2025 01:37:25

Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerbero...

  • EPSS 0.8%
  • Published 07.07.2016 15:59:00
  • Last modified 12.04.2025 10:46:40

libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSI...

  • EPSS 23.27%
  • Published 25.04.2016 00:59:06
  • Last modified 12.04.2025 10:46:40

Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.

  • EPSS 8.89%
  • Published 25.04.2016 00:59:05
  • Last modified 12.04.2025 10:46:40

The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client...

  • EPSS 18.1%
  • Published 25.04.2016 00:59:03
  • Last modified 12.04.2025 10:46:40

The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade att...

  • EPSS 2.39%
  • Published 25.04.2016 00:59:03
  • Last modified 12.04.2025 10:46:40

Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certific...

  • EPSS 5.16%
  • Published 25.04.2016 00:59:02
  • Last modified 12.04.2025 10:46:40

The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive sessi...

  • EPSS 16.94%
  • Published 25.04.2016 00:59:01
  • Last modified 12.04.2025 10:46:40

The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove app...