Search for packages
purl | pkg:alpm/archlinux/samba@4.5.2-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-5mms-cn4c-aaaa
Aliases: CVE-2016-2123 |
A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation. |
Affected by 0 other vulnerabilities. |
VCID-fxgp-ms8s-aaad
Aliases: CVE-2016-2126 |
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions. |
Affected by 0 other vulnerabilities. |
VCID-hqtj-747h-aaar
Aliases: CVE-2016-2125 |
It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:44:58.607666+00:00 | Arch Linux Importer | Affected by | VCID-5mms-cn4c-aaaa | https://security.archlinux.org/AVG-111 | 36.0.0 |
2025-03-28T07:44:58.573432+00:00 | Arch Linux Importer | Affected by | VCID-hqtj-747h-aaar | https://security.archlinux.org/AVG-111 | 36.0.0 |
2025-03-28T07:44:58.542032+00:00 | Arch Linux Importer | Affected by | VCID-fxgp-ms8s-aaad | https://security.archlinux.org/AVG-111 | 36.0.0 |
2024-12-17T23:20:47.495898+00:00 | Arch Linux Importer | Affected by | VCID-5mms-cn4c-aaaa | https://security.archlinux.org/AVG-111 | 35.0.0 |
2024-12-17T23:20:47.042102+00:00 | Arch Linux Importer | Affected by | VCID-hqtj-747h-aaar | https://security.archlinux.org/AVG-111 | 35.0.0 |
2024-12-17T23:20:46.591149+00:00 | Arch Linux Importer | Affected by | VCID-fxgp-ms8s-aaad | https://security.archlinux.org/AVG-111 | 35.0.0 |
2024-09-18T01:59:57.843482+00:00 | Arch Linux Importer | Affected by | VCID-5mms-cn4c-aaaa | https://security.archlinux.org/AVG-111 | 34.0.1 |
2024-09-18T01:59:57.815457+00:00 | Arch Linux Importer | Affected by | VCID-hqtj-747h-aaar | https://security.archlinux.org/AVG-111 | 34.0.1 |
2024-09-18T01:59:57.788702+00:00 | Arch Linux Importer | Affected by | VCID-fxgp-ms8s-aaad | https://security.archlinux.org/AVG-111 | 34.0.1 |
2024-04-23T19:47:31.506803+00:00 | Arch Linux Importer | Affected by | VCID-5mms-cn4c-aaaa | https://security.archlinux.org/AVG-111 | 34.0.0rc4 |
2024-04-23T19:47:31.484903+00:00 | Arch Linux Importer | Affected by | VCID-hqtj-747h-aaar | https://security.archlinux.org/AVG-111 | 34.0.0rc4 |
2024-04-23T19:47:31.462561+00:00 | Arch Linux Importer | Affected by | VCID-fxgp-ms8s-aaad | https://security.archlinux.org/AVG-111 | 34.0.0rc4 |
2024-01-03T22:26:12.985796+00:00 | Arch Linux Importer | Affected by | VCID-5mms-cn4c-aaaa | https://security.archlinux.org/AVG-111 | 34.0.0rc1 |
2024-01-03T22:26:12.959334+00:00 | Arch Linux Importer | Affected by | VCID-hqtj-747h-aaar | https://security.archlinux.org/AVG-111 | 34.0.0rc1 |
2024-01-03T22:26:12.932650+00:00 | Arch Linux Importer | Affected by | VCID-fxgp-ms8s-aaad | https://security.archlinux.org/AVG-111 | 34.0.0rc1 |