Search for packages
Package details: pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2
purl pkg:deb/debian/samba@2:4.17.12%2Bdfsg-0%2Bdeb12u2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (21)
Vulnerability Summary Aliases
VCID-16td-s1zq-jugr A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability. CVE-2021-20277
VCID-1wgp-edm9-wbdm A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. CVE-2023-0225
VCID-33us-sx1m-sked The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. CVE-2023-0922
VCID-4afa-ygdp-jfep A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met. CVE-2021-20251
VCID-53sp-9r2a-6ue8 The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. CVE-2023-0614
VCID-6pqd-cyxj-47hf Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it. CVE-2022-32743
VCID-6qfj-c85d-v3ap samba: Symlink race error can allow metadata read and modify outside of the exported share CVE-2021-20316
VCID-782h-tnd5-yyf4 Windows Kerberos Elevation of Privilege Vulnerability CVE-2022-37967
VCID-hc4j-ezm9-tqe9 A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability. CVE-2020-27840
VCID-hm94-u9pa-kuhg MaxQueryDuration not honoured in Samba AD DC LDAP CVE-2021-3670
VCID-k8tq-26rh-vqh4 A vulnerability was found in Samba where a delegated administrator with permission to create objects in Active Directory can write to all attributes of the newly created object, including security-sensitive attributes, even after the object's creation. This issue occurs because the administrator owns the object due to the lack of an Access Control List (ACL) at the time of creation and later being recognized as the 'creator owner.' The retained significant rights of the delegated administrator may not be well understood, potentially leading to unintended privilege escalation or security risks. CVE-2020-25720
VCID-kpgs-tn61-1kem PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug." CVE-2022-42898
VCID-mjaq-u9f8-qkgf Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96). CVE-2022-45141
VCID-mm47-ba5a-hqhv Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability CVE-2022-37966
VCID-rsns-atx8-vfg8 An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store. CVE-2018-14628
VCID-t1y5-mcnx-s3ha All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed. CVE-2021-44141
VCID-t38q-h456-r3af Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). CVE-2022-44640
VCID-tz37-jywy-9fg5 Netlogon RPC Elevation of Privilege Vulnerability CVE-2022-38023
VCID-upjr-x14j-vqe5 In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values. CVE-2022-1615
VCID-wdn4-uu4k-1bh8 A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task. CVE-2023-42669
VCID-yxjx-wcdt-4bgc A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence. CVE-2023-4154

Date Actor Action Vulnerability Source VulnerableCode Version
2025-09-09T21:01:31.965049+00:00 Debian Importer Fixing VCID-upjr-x14j-vqe5 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:54:39.846382+00:00 Debian Importer Fixing VCID-kpgs-tn61-1kem https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:52:25.672165+00:00 Debian Importer Fixing VCID-6pqd-cyxj-47hf https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:50:56.522637+00:00 Debian Importer Fixing VCID-t38q-h456-r3af https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:37:46.051894+00:00 Debian Importer Fixing VCID-hc4j-ezm9-tqe9 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:37:12.262978+00:00 Debian Importer Fixing VCID-1wgp-edm9-wbdm https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:36:57.039274+00:00 Debian Importer Fixing VCID-yxjx-wcdt-4bgc https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:36:31.988886+00:00 Debian Importer Fixing VCID-33us-sx1m-sked https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:25:25.378249+00:00 Debian Importer Fixing VCID-wdn4-uu4k-1bh8 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:16:38.763486+00:00 Debian Importer Fixing VCID-hm94-u9pa-kuhg https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:45:59.326819+00:00 Debian Importer Fixing VCID-16td-s1zq-jugr https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:35:49.465343+00:00 Debian Importer Fixing VCID-782h-tnd5-yyf4 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:33:44.613689+00:00 Debian Importer Fixing VCID-53sp-9r2a-6ue8 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:33:06.804705+00:00 Debian Importer Fixing VCID-t1y5-mcnx-s3ha https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:29:24.069366+00:00 Debian Importer Fixing VCID-k8tq-26rh-vqh4 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:27:34.129291+00:00 Debian Importer Fixing VCID-6qfj-c85d-v3ap https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:21:05.949885+00:00 Debian Importer Fixing VCID-mm47-ba5a-hqhv https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:20:25.477917+00:00 Debian Importer Fixing VCID-4afa-ygdp-jfep https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:16:43.345770+00:00 Debian Importer Fixing VCID-mjaq-u9f8-qkgf https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T19:03:47.538157+00:00 Debian Importer Fixing VCID-tz37-jywy-9fg5 https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:45:36.107591+00:00 Debian Importer Fixing VCID-rsns-atx8-vfg8 https://security-tracker.debian.org/tracker/data/json 37.0.0