rpm package
opensuse/ldb&distro=openSUSE Leap 15.3
pkg:rpm/opensuse/ldb&distro=openSUSE%20Leap%2015.3
Vulnerabilities (22)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-0336 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Aug 29, 2022 | The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on tha | ||
| CVE-2022-32746 | — | < 2.4.3-150300.3.20.1 | 2.4.3-150300.3.20.1 | Aug 25, 2022 | A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc | ||
| CVE-2022-32745 | — | < 2.4.3-150300.3.20.1 | 2.4.3-150300.3.20.1 | Aug 25, 2022 | A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. | ||
| CVE-2022-32744 | — | < 2.4.3-150300.3.20.1 | 2.4.3-150300.3.20.1 | Aug 25, 2022 | A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. | ||
| CVE-2022-32742 | — | < 2.4.3-150300.3.20.1 | 2.4.3-150300.3.20.1 | Aug 25, 2022 | A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control | ||
| CVE-2022-2031 | — | < 2.4.3-150300.3.20.1 | 2.4.3-150300.3.20.1 | Aug 25, 2022 | A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tic | ||
| CVE-2021-3670 | — | < 2.4.2-150300.3.15.1 | 2.4.2-150300.3.15.1 | Aug 23, 2022 | MaxQueryDuration not honoured in Samba AD DC LDAP | ||
| CVE-2021-20316 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Aug 23, 2022 | A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share. | ||
| CVE-2020-25721 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Mar 16, 2022 | Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets. | ||
| CVE-2021-3738 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Mar 2, 2022 | In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credent | ||
| CVE-2021-23192 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Mar 2, 2022 | A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | ||
| CVE-2021-44142 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Feb 21, 2022 | The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bou | ||
| CVE-2021-44141 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Feb 21, 2022 | All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this | ||
| CVE-2020-25722 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Feb 18, 2022 | Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise. | ||
| CVE-2020-25719 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Feb 18, 2022 | A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found withi | ||
| CVE-2020-25718 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Feb 18, 2022 | A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | ||
| CVE-2020-25717 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Feb 18, 2022 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | ||
| CVE-2016-2124 | — | < 2.2.2-3.3.1 | 2.2.2-3.3.1 | Feb 18, 2022 | A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required. | ||
| CVE-2021-43566 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Jan 11, 2022 | All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via | ||
| CVE-2021-36222 | — | < 2.4.1-150300.3.10.1 | 2.4.1-150300.3.10.1 | Jul 22, 2021 | ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a |
- CVE-2022-0336Aug 29, 2022affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on tha
- CVE-2022-32746Aug 25, 2022affected < 2.4.3-150300.3.20.1fixed 2.4.3-150300.3.20.1
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc
- CVE-2022-32745Aug 25, 2022affected < 2.4.3-150300.3.20.1fixed 2.4.3-150300.3.20.1
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
- CVE-2022-32744Aug 25, 2022affected < 2.4.3-150300.3.20.1fixed 2.4.3-150300.3.20.1
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
- CVE-2022-32742Aug 25, 2022affected < 2.4.3-150300.3.20.1fixed 2.4.3-150300.3.20.1
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control
- CVE-2022-2031Aug 25, 2022affected < 2.4.3-150300.3.20.1fixed 2.4.3-150300.3.20.1
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tic
- CVE-2021-3670Aug 23, 2022affected < 2.4.2-150300.3.15.1fixed 2.4.2-150300.3.15.1
MaxQueryDuration not honoured in Samba AD DC LDAP
- CVE-2021-20316Aug 23, 2022affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.
- CVE-2020-25721Mar 16, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
- CVE-2021-3738Mar 2, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credent
- CVE-2021-23192Mar 2, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
- CVE-2021-44142Feb 21, 2022affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bou
- CVE-2021-44141Feb 21, 2022affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this
- CVE-2020-25722Feb 18, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.
- CVE-2020-25719Feb 18, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found withi
- CVE-2020-25718Feb 18, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.
- CVE-2020-25717Feb 18, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
- CVE-2016-2124Feb 18, 2022affected < 2.2.2-3.3.1fixed 2.2.2-3.3.1
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
- CVE-2021-43566Jan 11, 2022affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via
- CVE-2021-36222Jul 22, 2021affected < 2.4.1-150300.3.10.1fixed 2.4.1-150300.3.10.1
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a
Page 1 of 2