Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-2111

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-30 Apr, 2012 | 14:00
Updated At-06 Aug, 2024 | 19:26
Rejected At-
Credits

The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:30 Apr, 2012 | 14:00
Updated At:06 Aug, 2024 | 19:26
Rejected At:
▼CVE Numbering Authority (CNA)

The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.ubuntu.com/usn/USN-1434-1
vendor-advisory
x_refsource_UBUNTU
http://osvdb.org/81648
vdb-entry
x_refsource_OSVDB
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
vendor-advisory
x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/48996
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/49017
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1026988
vdb-entry
x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=134323086902585&w=2
vendor-advisory
x_refsource_HP
http://www.samba.org/samba/security/CVE-2012-2111
x_refsource_CONFIRM
http://secunia.com/advisories/48976
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
vendor-advisory
x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/49030
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
vendor-advisory
x_refsource_FEDORA
http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
x_refsource_CONFIRM
http://secunia.com/advisories/48984
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/48999
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
vendor-advisory
x_refsource_SUSE
http://www.debian.org/security/2012/dsa-2463
vendor-advisory
x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=134323086902585&w=2
vendor-advisory
x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2012-0533.html
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.ubuntu.com/usn/USN-1434-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://osvdb.org/81648
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/48996
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/49017
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securitytracker.com/id?1026988
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.samba.org/samba/security/CVE-2012-2111
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/48976
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/49030
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/48984
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/48999
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.debian.org/security/2012/dsa-2463
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.ubuntu.com/usn/USN-1434-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://osvdb.org/81648
vdb-entry
x_refsource_OSVDB
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/48996
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/49017
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1026988
vdb-entry
x_refsource_SECTRACK
x_transferred
http://marc.info/?l=bugtraq&m=134323086902585&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.samba.org/samba/security/CVE-2012-2111
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/48976
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/49030
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/48984
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/48999
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.debian.org/security/2012/dsa-2463
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://marc.info/?l=bugtraq&m=134323086902585&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-0533.html
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1434-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://osvdb.org/81648
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/48996
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/49017
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securitytracker.com/id?1026988
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.samba.org/samba/security/CVE-2012-2111
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/48976
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/49030
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/48984
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/48999
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.debian.org/security/2012/dsa-2463
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0533.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:30 Apr, 2012 | 14:55
Updated At:11 Apr, 2025 | 00:51

The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Samba
samba
>>samba>>3.4.0
cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.1
cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.2
cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.3
cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.4
cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.5
cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.6
cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.7
cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.8
cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.9
cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.10
cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.11
cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.12
cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.13
cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.14
cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.15
cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.4.16
cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.0
cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.1
cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.2
cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.3
cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.4
cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.5
cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.6
cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.7
cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.8
cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.9
cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.10
cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.11
cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.12
cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.13
cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.5.14
cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.6.0
cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.6.1
cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.6.2
cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.6.3
cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
Samba
samba
>>samba>>3.6.4
cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.htmlsecalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=134323086902585&w=2secalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=134323086902585&w=2secalert@redhat.com
N/A
http://osvdb.org/81648secalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2012-0533.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/48976secalert@redhat.com
N/A
http://secunia.com/advisories/48984secalert@redhat.com
N/A
http://secunia.com/advisories/48996secalert@redhat.com
N/A
http://secunia.com/advisories/48999secalert@redhat.com
N/A
http://secunia.com/advisories/49017secalert@redhat.com
N/A
http://secunia.com/advisories/49030secalert@redhat.com
N/A
http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578secalert@redhat.com
N/A
http://www.debian.org/security/2012/dsa-2463secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:067secalert@redhat.com
N/A
http://www.samba.org/samba/security/CVE-2012-2111secalert@redhat.com
Patch
Vendor Advisory
http://www.securitytracker.com/id?1026988secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-1434-1secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=134323086902585&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=134323086902585&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/81648af854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-0533.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/48976af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/48984af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/48996af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/48999af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/49017af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/49030af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2012/dsa-2463af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:067af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.samba.org/samba/security/CVE-2012-2111af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.securitytracker.com/id?1026988af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-1434-1af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://osvdb.org/81648
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0533.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/48976
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/48984
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/48996
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/48999
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/49017
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/49030
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2012/dsa-2463
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.samba.org/samba/security/CVE-2012-2111
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id?1026988
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1434-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=134323086902585&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://osvdb.org/81648
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-0533.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/48976
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/48984
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/48996
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/48999
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/49017
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/49030
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2012/dsa-2463
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.samba.org/samba/security/CVE-2012-2111
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id?1026988
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1434-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2016-2123
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-1.47% / 80.11%
||
7 Day CHG~0.00%
Published-01 Nov, 2018 | 13:00
Updated-05 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.

Action-Not Available
Vendor-[UNKNOWN]Samba
Product-sambasamba
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-10858
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-7.05% / 91.12%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 17:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxSambaRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxvirtualizationdebian_linuxsambaenterprise_linux_workstationvirtualization_hostenterprise_linux_desktopsamba
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-1057
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-5.32% / 89.66%
||
7 Day CHG~0.00%
Published-13 Mar, 2018 | 16:00
Updated-05 Aug, 2024 | 03:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxSamba
Product-ubuntu_linuxdebian_linuxsambaSamba
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-25722
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.30% / 52.73%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 00:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxSambaFedora Project
Product-ubuntu_linuxdebian_linuxfedorasambasamba
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-25718
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.13% / 33.52%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 00:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.

Action-Not Available
Vendor-n/aSambaFedora Project
Product-fedorasambasamba
CWE ID-CWE-862
Missing Authorization
CVE-2020-25721
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.73%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 00:00
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.

Action-Not Available
Vendor-n/aSamba
Product-sambasamba
CWE ID-CWE-20
Improper Input Validation
CVE-2021-3738
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.29% / 51.58%
||
7 Day CHG~0.00%
Published-02 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.

Action-Not Available
Vendor-n/aSamba
Product-sambasamba
CWE ID-CWE-416
Use After Free
Details not found