Samba

Samba

211 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 10.81%
  • Veröffentlicht 15.09.2010 18:00:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file ...

Exploit
  • EPSS 6.71%
  • Veröffentlicht 17.06.2010 16:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field ...

Exploit
  • EPSS 5.05%
  • Veröffentlicht 17.06.2010 16:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length...

  • EPSS 78.18%
  • Veröffentlicht 17.06.2010 16:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arb...

  • EPSS 27.49%
  • Veröffentlicht 10.03.2010 20:13:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by u...

  • EPSS 1.58%
  • Veröffentlicht 10.03.2010 20:13:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.

  • EPSS 0.12%
  • Veröffentlicht 02.03.2010 18:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.

  • EPSS 1.11%
  • Veröffentlicht 04.02.2010 20:15:24
  • Zuletzt bearbeitet 11.04.2025 00:51:21

client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a ...

  • EPSS 0.19%
  • Veröffentlicht 07.10.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.

  • EPSS 0.14%
  • Veröffentlicht 07.10.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain t...