rpm package
suse/samba&distro=SUSE Linux Enterprise Module for Basesystem 15 SP3
pkg:rpm/suse/samba&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3
Vulnerabilities (29)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-25719 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Feb 18, 2022 | A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found withi | ||
| CVE-2020-25718 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Feb 18, 2022 | A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | ||
| CVE-2020-25717 | — | < 4.13.13+git.539.fdbc44a8598-3.20.2 | 4.13.13+git.539.fdbc44a8598-3.20.2 | Feb 18, 2022 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | ||
| CVE-2016-2124 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Feb 18, 2022 | A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required. | ||
| CVE-2021-43566 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Jan 11, 2022 | All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via | ||
| CVE-2021-36222 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Jul 22, 2021 | ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a | ||
| CVE-2020-27840 | — | < 4.13.6+git.211.555d60b24ba-3.7.1 | 4.13.6+git.211.555d60b24ba-3.7.1 | May 12, 2021 | A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to syst | ||
| CVE-2021-20277 | — | < 4.13.6+git.211.555d60b24ba-3.7.1 | 4.13.6+git.211.555d60b24ba-3.7.1 | May 12, 2021 | A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability. | ||
| CVE-2021-20254 | — | < 4.13.6+git.211.555d60b24ba-3.7.1 | 4.13.6+git.211.555d60b24ba-3.7.1 | May 5, 2021 | A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added t |
- CVE-2020-25719Feb 18, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found withi
- CVE-2020-25718Feb 18, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.
- CVE-2020-25717Feb 18, 2022affected < 4.13.13+git.539.fdbc44a8598-3.20.2fixed 4.13.13+git.539.fdbc44a8598-3.20.2
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
- CVE-2016-2124Feb 18, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
- CVE-2021-43566Jan 11, 2022affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via
- CVE-2021-36222Jul 22, 2021affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a
- CVE-2020-27840May 12, 2021affected < 4.13.6+git.211.555d60b24ba-3.7.1fixed 4.13.6+git.211.555d60b24ba-3.7.1
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to syst
- CVE-2021-20277May 12, 2021affected < 4.13.6+git.211.555d60b24ba-3.7.1fixed 4.13.6+git.211.555d60b24ba-3.7.1
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
- CVE-2021-20254May 5, 2021affected < 4.13.6+git.211.555d60b24ba-3.7.1fixed 4.13.6+git.211.555d60b24ba-3.7.1
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added t
Page 2 of 2