rpm package
suse/samba&distro=SUSE Linux Enterprise Module for Basesystem 15 SP3
pkg:rpm/suse/samba&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3
Vulnerabilities (29)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-3437 | — | < 4.15.12+git.535.7750e5c95ef-150300.3.43.1 | 4.15.12+git.535.7750e5c95ef-150300.3.43.1 | Jan 12, 2023 | A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory w | ||
| CVE-2022-42898 | — | < 4.15.12+git.535.7750e5c95ef-150300.3.43.1 | 4.15.12+git.535.7750e5c95ef-150300.3.43.1 | Dec 25, 2022 | PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cau | ||
| CVE-2022-38023 | — | < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | Nov 9, 2022 | Netlogon RPC Elevation of Privilege Vulnerability | ||
| CVE-2022-37967 | — | < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | Nov 9, 2022 | Windows Kerberos Elevation of Privilege Vulnerability | ||
| CVE-2022-37966 | — | < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | 4.15.13+git.540.fab3b2a46c6-150300.3.46.1 | Nov 9, 2022 | Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability | ||
| CVE-2022-32743 | — | < 4.15.8+git.527.8d0c05d313e-150300.3.40.2 | 4.15.8+git.527.8d0c05d313e-150300.3.40.2 | Sep 1, 2022 | Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it. | ||
| CVE-2022-1615 | — | < 4.15.8+git.527.8d0c05d313e-150300.3.40.2 | 4.15.8+git.527.8d0c05d313e-150300.3.40.2 | Sep 1, 2022 | In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values. | ||
| CVE-2022-0336 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Aug 29, 2022 | The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on tha | ||
| CVE-2022-32746 | — | < 4.15.8+git.500.d5910280cc7-150300.3.37.1 | 4.15.8+git.500.d5910280cc7-150300.3.37.1 | Aug 25, 2022 | A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc | ||
| CVE-2022-32745 | — | < 4.15.8+git.500.d5910280cc7-150300.3.37.1 | 4.15.8+git.500.d5910280cc7-150300.3.37.1 | Aug 25, 2022 | A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. | ||
| CVE-2022-32744 | — | < 4.15.8+git.500.d5910280cc7-150300.3.37.1 | 4.15.8+git.500.d5910280cc7-150300.3.37.1 | Aug 25, 2022 | A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover. | ||
| CVE-2022-32742 | — | < 4.15.8+git.500.d5910280cc7-150300.3.37.1 | 4.15.8+git.500.d5910280cc7-150300.3.37.1 | Aug 25, 2022 | A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control | ||
| CVE-2022-2031 | — | < 4.15.8+git.500.d5910280cc7-150300.3.37.1 | 4.15.8+git.500.d5910280cc7-150300.3.37.1 | Aug 25, 2022 | A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tic | ||
| CVE-2021-20316 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Aug 23, 2022 | A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share. | ||
| CVE-2020-25721 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Mar 16, 2022 | Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets. | ||
| CVE-2021-3738 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Mar 2, 2022 | In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credent | ||
| CVE-2021-23192 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Mar 2, 2022 | A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements. | ||
| CVE-2021-44142 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Feb 21, 2022 | The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bou | ||
| CVE-2021-44141 | — | < 4.15.4+git.324.8332acf1a63-150300.3.25.3 | 4.15.4+git.324.8332acf1a63-150300.3.25.3 | Feb 21, 2022 | All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this | ||
| CVE-2020-25722 | — | < 4.13.13+git.528.140935f8d6a-3.12.1 | 4.13.13+git.528.140935f8d6a-3.12.1 | Feb 18, 2022 | Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise. |
- CVE-2022-3437Jan 12, 2023affected < 4.15.12+git.535.7750e5c95ef-150300.3.43.1fixed 4.15.12+git.535.7750e5c95ef-150300.3.43.1
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory w
- CVE-2022-42898Dec 25, 2022affected < 4.15.12+git.535.7750e5c95ef-150300.3.43.1fixed 4.15.12+git.535.7750e5c95ef-150300.3.43.1
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cau
- CVE-2022-38023Nov 9, 2022affected < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1fixed 4.15.13+git.540.fab3b2a46c6-150300.3.46.1
Netlogon RPC Elevation of Privilege Vulnerability
- CVE-2022-37967Nov 9, 2022affected < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1fixed 4.15.13+git.540.fab3b2a46c6-150300.3.46.1
Windows Kerberos Elevation of Privilege Vulnerability
- CVE-2022-37966Nov 9, 2022affected < 4.15.13+git.540.fab3b2a46c6-150300.3.46.1fixed 4.15.13+git.540.fab3b2a46c6-150300.3.46.1
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
- CVE-2022-32743Sep 1, 2022affected < 4.15.8+git.527.8d0c05d313e-150300.3.40.2fixed 4.15.8+git.527.8d0c05d313e-150300.3.40.2
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
- CVE-2022-1615Sep 1, 2022affected < 4.15.8+git.527.8d0c05d313e-150300.3.40.2fixed 4.15.8+git.527.8d0c05d313e-150300.3.40.2
In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values.
- CVE-2022-0336Aug 29, 2022affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on tha
- CVE-2022-32746Aug 25, 2022affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAc
- CVE-2022-32745Aug 25, 2022affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
- CVE-2022-32744Aug 25, 2022affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
- CVE-2022-32742Aug 25, 2022affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control
- CVE-2022-2031Aug 25, 2022affected < 4.15.8+git.500.d5910280cc7-150300.3.37.1fixed 4.15.8+git.500.d5910280cc7-150300.3.37.1
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tic
- CVE-2021-20316Aug 23, 2022affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.
- CVE-2020-25721Mar 16, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
- CVE-2021-3738Mar 2, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credent
- CVE-2021-23192Mar 2, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.
- CVE-2021-44142Feb 21, 2022affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bou
- CVE-2021-44141Feb 21, 2022affected < 4.15.4+git.324.8332acf1a63-150300.3.25.3fixed 4.15.4+git.324.8332acf1a63-150300.3.25.3
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this
- CVE-2020-25722Feb 18, 2022affected < 4.13.13+git.528.140935f8d6a-3.12.1fixed 4.13.13+git.528.140935f8d6a-3.12.1
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.
Page 1 of 2