rpm package
opensuse/ldb&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/ldb&distro=openSUSE%20Tumbleweed
Vulnerabilities (11)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-0614 | — | < 2.7.2-1.1 | 2.7.2-1.1 | Apr 3, 2023 | The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. | ||
| CVE-2022-32746 | — | < 2.5.2-1.1 | 2.5.2-1.1 | Aug 25, 2022 | A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc | ||
| CVE-2021-3670 | — | < 2.4.2-1.1 | 2.4.2-1.1 | Aug 23, 2022 | MaxQueryDuration not honoured in Samba AD DC LDAP | ||
| CVE-2020-27840 | — | < 2.3.0-1.3 | 2.3.0-1.3 | May 12, 2021 | A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to syst | ||
| CVE-2021-20277 | — | < 2.3.0-1.3 | 2.3.0-1.3 | May 12, 2021 | A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability. | ||
| CVE-2020-10730 | — | < 2.3.0-1.3 | 2.3.0-1.3 | Jul 7, 2020 | A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is | ||
| CVE-2020-10700 | — | < 2.3.0-1.3 | 2.3.0-1.3 | May 4, 2020 | A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.1 | ||
| CVE-2019-3824 | — | < 2.3.0-1.3 | 2.3.0-1.3 | Mar 6, 2019 | A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service. | ||
| CVE-2018-1140 | — | < 2.3.0-1.3 | 2.3.0-1.3 | Aug 22, 2018 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards | ||
| CVE-2015-5330 | Hig | 7.5 | < 1.1.27-1.1 | 1.1.27-1.1 | Dec 29, 2015 | ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1 | |
| CVE-2015-3223 | Med | 5.3 | < 1.1.27-1.1 | 1.1.27-1.1 | Dec 29, 2015 | The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) |
- CVE-2023-0614Apr 3, 2023affected < 2.7.2-1.1fixed 2.7.2-1.1
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
- CVE-2022-32746Aug 25, 2022affected < 2.5.2-1.1fixed 2.5.2-1.1
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc
- CVE-2021-3670Aug 23, 2022affected < 2.4.2-1.1fixed 2.4.2-1.1
MaxQueryDuration not honoured in Samba AD DC LDAP
- CVE-2020-27840May 12, 2021affected < 2.3.0-1.3fixed 2.3.0-1.3
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to syst
- CVE-2021-20277May 12, 2021affected < 2.3.0-1.3fixed 2.3.0-1.3
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
- CVE-2020-10730Jul 7, 2020affected < 2.3.0-1.3fixed 2.3.0-1.3
A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is
- CVE-2020-10700May 4, 2020affected < 2.3.0-1.3fixed 2.3.0-1.3
A use-after-free flaw was found in the way samba AD DC LDAP servers, handled 'Paged Results' control is combined with the 'ASQ' control. A malicious user in a samba AD could use this flaw to cause denial of service. This issue affects all samba versions before 4.10.15, before 4.1
- CVE-2019-3824Mar 6, 2019affected < 2.3.0-1.3fixed 2.3.0-1.3
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
- CVE-2018-1140Aug 22, 2018affected < 2.3.0-1.3fixed 2.3.0-1.3
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards
- affected < 1.1.27-1.1fixed 1.1.27-1.1
ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1
- affected < 1.1.27-1.1fixed 1.1.27-1.1
The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop)