VYPR

rpm package

suse/samba&distro=SUSE Linux Enterprise High Availability Extension 15 SP3

pkg:rpm/suse/samba&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3

Vulnerabilities (42)

  • CVE-2022-0336Aug 29, 2022
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on tha

  • CVE-2022-32746Aug 25, 2022
    affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1

    A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc

  • CVE-2022-32745Aug 25, 2022
    affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1

    A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.

  • CVE-2022-32744Aug 25, 2022
    affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1

    A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.

  • CVE-2022-32742Aug 25, 2022
    affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1

    A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control

  • CVE-2022-2031Aug 25, 2022
    affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1

    A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tic

  • CVE-2021-20316Aug 23, 2022
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.

  • CVE-2020-25721Mar 16, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.

  • CVE-2021-3738Mar 2, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credent

  • CVE-2021-23192Mar 2, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.

  • CVE-2021-44142Feb 21, 2022
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bou

  • CVE-2021-44141Feb 21, 2022
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this

  • CVE-2020-25722Feb 18, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.

  • CVE-2020-25719Feb 18, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found withi

  • CVE-2020-25718Feb 18, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.

  • CVE-2020-25717Feb 18, 2022
    affected < 4.13.13+git.539.fdbc44a8598-3.20.2fixed 4.13.13+git.539.fdbc44a8598-3.20.2

    A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

  • CVE-2016-2124Feb 18, 2022
    affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1

    A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

  • CVE-2021-43566Jan 11, 2022
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via

  • CVE-2021-36222Jul 22, 2021
    affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3

    ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a

  • CVE-2020-27840May 12, 2021
    affected < 4.13.6+git.211.555d60b24ba-3.7.1fixed 4.13.6+git.211.555d60b24ba-3.7.1

    A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to syst