|
VCID-16td-s1zq-jugr
|
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
|
CVE-2021-20277
|
|
VCID-1wgp-edm9-wbdm
|
A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.
|
CVE-2023-0225
|
|
VCID-33us-sx1m-sked
|
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
|
CVE-2023-0922
|
|
VCID-4afa-ygdp-jfep
|
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
|
CVE-2021-20251
|
|
VCID-53sp-9r2a-6ue8
|
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
|
CVE-2023-0614
|
|
VCID-6pqd-cyxj-47hf
|
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
|
CVE-2022-32743
|
|
VCID-6qfj-c85d-v3ap
|
samba: Symlink race error can allow metadata read and modify outside of the exported share
|
CVE-2021-20316
|
|
VCID-782h-tnd5-yyf4
|
Windows Kerberos Elevation of Privilege Vulnerability
|
CVE-2022-37967
|
|
VCID-hc4j-ezm9-tqe9
|
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
|
CVE-2020-27840
|
|
VCID-hm94-u9pa-kuhg
|
MaxQueryDuration not honoured in Samba AD DC LDAP
|
CVE-2021-3670
|
|
VCID-k8tq-26rh-vqh4
|
A vulnerability was found in Samba where a delegated administrator with permission to create objects in Active Directory can write to all attributes of the newly created object, including security-sensitive attributes, even after the object's creation. This issue occurs because the administrator owns the object due to the lack of an Access Control List (ACL) at the time of creation and later being recognized as the 'creator owner.' The retained significant rights of the delegated administrator may not be well understood, potentially leading to unintended privilege escalation or security risks.
|
CVE-2020-25720
|
|
VCID-kpgs-tn61-1kem
|
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
|
CVE-2022-42898
|
|
VCID-mjaq-u9f8-qkgf
|
Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).
|
CVE-2022-45141
|
|
VCID-mm47-ba5a-hqhv
|
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
|
CVE-2022-37966
|
|
VCID-rsns-atx8-vfg8
|
An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store.
|
CVE-2018-14628
|
|
VCID-t1y5-mcnx-s3ha
|
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.
|
CVE-2021-44141
|
|
VCID-t38q-h456-r3af
|
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
|
CVE-2022-44640
|
|
VCID-tz37-jywy-9fg5
|
Netlogon RPC Elevation of Privilege Vulnerability
|
CVE-2022-38023
|
|
VCID-upjr-x14j-vqe5
|
In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values.
|
CVE-2022-1615
|
|
VCID-wdn4-uu4k-1bh8
|
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
|
CVE-2023-42669
|
|
VCID-yxjx-wcdt-4bgc
|
A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
|
CVE-2023-4154
|