1 <!--#include virtual="/samba/header.html" -->
2 <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
5 <h2>Samba Security Releases</h2>
7 <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
13 <table class="security_table">
14 <th colspan="6">Samba Security Releases</th>
16 <td><em>Date Issued</em></td>
17 <td><em>Download</em></td>
18 <td><em>Known Issue(s)</em></td>
19 <td><em>Affected Releases</em></td>
20 <td><em>CVE ID #</em></td>
21 <td><em>Details</em></td>
26 <td><a href="/samba/ftp/patches/security/samba-4.6.0-CVE-2017-2619.patch">
27 patch for Samba 4.6.0</a><br />
28 <a href="/samba/ftp/patches/security/samba-4.5.6-CVE-2017-2619.patch">
29 patch for Samba 4.5.6</a><br />
30 <a href="/samba/ftp/patches/security/samba-4.4.11-CVE-2017-2619.patch">
31 patch for Samba 4.4.11</a><br />
32 <td>Symlink race allows access outside share definition.
34 <td>All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12</td>
35 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619">CVE-2017-2619</a>
37 <td><a href="/samba/security/CVE-2017-2619.html">Announcement</a>
43 <td><a href="/samba/ftp/patches/security/samba-4.5.2-security-20016-12-19.patch">
44 patch for Samba 4.5.2</a><br />
45 <a href="/samba/ftp/patches/security/samba-4.4.7-security-20016-12-19.patch">
46 patch for Samba 4.4.7</a><br />
47 <a href="/samba/ftp/patches/security/samba-4.3.12-security-20016-12-19.patch">
48 patch for Samba 4.3.12</a><br />
49 <td>Numerous CVEs. Please see the announcements for details.
51 <td>please refer to the advisories</td>
52 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123">CVE-2016-2123</a>,
53 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125">CVE-2016-2125</a>,
54 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126">CVE-2016-2126</a>
56 <td><a href="/samba/security/CVE-2016-2123.html">Announcement</a>,
57 <a href="/samba/security/CVE-2016-2125.html">Announcement</a>,
58 <a href="/samba/security/CVE-2016-2126.html">Announcement</a>
64 <td><a href="/samba/ftp/patches/security/samba-4.4.4-CVE-2016-2119.patch">
65 patch for Samba 4.4.4</a><br />
66 <a href="/samba/ftp/patches/security/samba-4.3.10-CVE-2016-2119.patch">
67 patch for Samba 4.3.10</a><br />
68 <a href="/samba/ftp/patches/security/samba-4.2.13-CVE-2016-2119.patch">
69 patch for Samba 4.2.13</a><br />
70 <td>Client side SMB2/3 required signing can be downgraded.
72 <td>4.0.0 - 4.4.4</td>
73 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119">CVE-2016-2119</a>
75 <td><a href="/samba/security/CVE-2016-2119.html">Announcement</a>
81 <td><a href="/samba/ftp/patches/security/samba-4.4.0-security-2016-04-12-final.patch">
82 patch for Samba 4.4.0</a><br />
83 <a href="/samba/ftp/patches/security/samba-4.3.6-security-2016-04-12-final.patch">
84 patch for Samba 4.3.6</a><br />
85 <a href="/samba/ftp/patches/security/samba-4.2.9-security-2016-04-12-final.patch">
86 patch for Samba 4.2.9</a><br />
87 <a href="/samba/ftp/patches/security/samba-v4-0-security-2016-04-12-fileserver-only.patch.xz">
88 patch for Samba 4.0.26 (fileserver only! no client! no domain controller!)</a><br />
89 <a href="/samba/ftp/patches/security/samba-v3-6-security-2016-04-12.tar.xz">
90 patch for Samba 3.6.25 (only related CVEs)</a><br />
91 <td>Numerous CVEs. Please see the announcements for details.
93 <td>please refer to the advisories</td>
94 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370">CVE-2015-5370</a>,
95 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110">CVE-2016-2110</a>,
96 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111">CVE-2016-2111</a>,
97 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112">CVE-2016-2112</a>,
98 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113">CVE-2016-2113</a>,
99 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114">CVE-2016-2114</a>,
100 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115">CVE-2016-2115</a>,
101 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118">CVE-2016-2118</a>
103 <td><a href="/samba/security/CVE-2015-5370.html">Announcement</a>
104 <a href="/samba/security/CVE-2016-2110.html">Announcement</a>
105 <a href="/samba/security/CVE-2016-2111.html">Announcement</a>
106 <a href="/samba/security/CVE-2016-2112.html">Announcement</a>
107 <a href="/samba/security/CVE-2016-2113.html">Announcement</a>
108 <a href="/samba/security/CVE-2016-2114.html">Announcement</a>
109 <a href="/samba/security/CVE-2016-2115.html">Announcement</a>
110 <a href="/samba/security/CVE-2016-2118.html">Announcement</a>
116 <td><a href="/samba/ftp/patches/security/samba-4.3.5-security-2016-03-08.patch">
117 patch for Samba 4.3.5</a><br />
118 <a href="/samba/ftp/patches/security/samba-4.2.8-security-2016-03-08.patch">
119 patch for Samba 4.2.8</a><br />
120 <a href="/samba/ftp/patches/security/samba-4.1.22-security-2016-03-08.patch">
121 patch for Samba 4.1.22</a><br />
122 <td>Incorrect ACL get/set allowed on symlink path, Out-of-bounds read in internal DNS server.
124 <td>please refer to the advisories</td>
125 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560">CVE-2015-7560</a>,
126 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771">CVE-2016-0771</a>,
128 <td><a href="/samba/security/CVE-2015-7560.html">Announcement</a>
129 <a href="/samba/security/CVE-2016-0771.html">Announcement</a>
135 <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
136 patch for Samba 4.3.2</a><br />
137 <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
138 patch for Samba 4.2.6</a><br />
139 <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
140 patch for Samba 4.1.21</a><br />
141 <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
142 patch for Samba 3.6.25</a><br />
143 <td>Numerous CVEs. Please see the announcements for details.
145 <td>3.0.0 to 4.3.2</td>
146 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>,
147 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>,
148 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>,
149 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>,
150 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>,
151 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>,
152 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
154 <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
155 <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
156 <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
157 <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
158 <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
159 <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
160 <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
166 <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
167 patch for Samba 4.1.16</a><br />
168 <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
169 patch for Samba 4.0.24</a><br />
170 <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
171 patch for Samba 3.6.24</a><br />
172 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
173 patch for Samba 3.5.22</a><br />
174 <td>Unexpected code execution in smbd.
176 <td>3.5.0 - 4.2.0rc4</td>
177 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
179 <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
185 <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
186 patch for Samba 4.1.15</a><br />
187 <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
188 patch for Samba 4.0.23</a><br />
189 <td>Elevation of privilege to Active Directory Domain Controller.
191 <td>4.0.0 - 4.1.15</td>
192 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
194 <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
200 <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
201 patch for Samba 4.1.10</a><br />
202 <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
203 patch for Samba 4.0.20</a><br />
204 <td>Remote code execution in nmbd.
206 <td>4.0.0 - 4.1.10</td>
207 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
209 <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
215 <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
216 patch for Samba 4.1.8</a><br />
217 <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
218 patch for Samba 4.0.18</a><br />
219 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
220 patch for Samba 3.6.23</a><br />
221 <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
223 <td>please refer to the advisories</td>
224 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>,
225 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
227 <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
228 <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
233 <td>03 June 2014</td>
234 <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
235 patch for Samba 4.0.17</a><br />
236 <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
237 patch for Samba 4.1.7</a><br />
238 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
239 patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
240 <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
242 <td>please refer to the advisories</td>
243 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>,
244 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
246 <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
247 <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
253 <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
254 patch for Samba 4.1.5</a><br />
255 <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
256 patch for Samba 4.0.15</a><br />
257 <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
258 patch for Samba 3.6.22</a><br />
259 <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
260 or directory ACL by mistake.
262 <td>please refer to the advisories</td>
263 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>,
264 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
266 <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
267 <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
273 <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
274 patch for Samba 4.1.2</a><br />
275 <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
276 patch for Samba 4.0.12</a><br />
277 <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
278 patch for Samba 3.6.21</a><br />
279 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
280 patch for Samba 3.5.22</a><br />
281 <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
282 patch for Samba 3.4.17</a>
283 <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
284 login without require_membership_of restrictions.</td>
285 <td>please refer to the advisories</td>
286 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>,
287 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
289 <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
290 <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
296 <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
297 patch for Samba 4.1.0</a><br />
298 <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
299 patch for Samba 4.0.10</a><br />
300 <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
301 patch for Samba 3.6.19</a><br />
302 <td>ACLs are not checked on opening an alternate data stream on a file
303 or directory, Private key in key.pem world readable.</td>
304 <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
305 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>,
306 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
308 <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
309 <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
315 <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
316 patch for Samba 4.0.7</a><br />
317 <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
318 patch for Samba 3.6.16</a><br />
319 <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
320 patch for Samba 3.5.21</a><br />
321 <td>Denial of service - CPU loop and memory allocation.</td>
324 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
326 <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
332 <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
333 patch for Samba 3.6.5</a>
334 <td>A writable configured share might get read only</td>
335 <td>3.6.0 - 3.6.5 (inclusive)</td>
336 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
338 <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
344 <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
345 patch for Samba 4.0.3</a>
346 <td>World-writeable files may be created in additional shares on a Samba
348 <td>4.0.0rc6-4.0.3</td>
349 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
351 <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
357 <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
358 patch for Samba 4.0.1</a><br />
359 <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
360 patch for Samba 3.6.11</a><br />
361 <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
362 patch for Samba 3.5.20</a><br />
363 <td>Clickjacking issue and potential XSRF in SWAT.</td>
365 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>,
366 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
368 <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
369 <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
375 <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
376 patch for Samba 4.0.0</a>
377 <td>Samba 4.0 as an AD DC may provide authenticated users with write
378 access to LDAP directory objects.</td>
380 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
381 <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
386 <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
387 patch for Samba 3.4.16</a><br />
388 <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
389 patch for Samba 3.5.14</a><br />
390 <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
391 patch for Samba 3.6.4</a><br />
392 <td>Incorrect permission checks when granting/removing privileges can
393 compromise file server security.</td>
395 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
396 <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
401 <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
402 patch for Samba 3.0.37</a><br />
403 <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
404 patch for Samba 3.2.15</a><br />
405 <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
406 patch for Samba 3.3.16</a><br />
407 <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
408 patch for Samba 3.4.15</a><br />
409 <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
410 patch for Samba 3.5.13</a><br />
411 <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
412 patch for Samba 3.6.3</a><br />
413 <td>"root" credential remote code execution</td>
414 <td>all current releases</td>
415 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
416 <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
421 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
422 patch for Samba 3.0</a><br />
423 <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
424 patch for Samba 3.2</a><br />
425 <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
426 patch for Samba 3.3</a><br />
427 <td>Remote code execution vulnerability in smbd</td>
429 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
430 <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
435 <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
436 patch for Samba 3.6.2</a>
437 <td>Memory leak/Denial of service</td>
439 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
440 <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
445 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
446 patch for Samba 3.3.15</a><br />
447 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
448 patch for Samba 3.4.13</a><br />
449 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
450 patch for Samba 3.5.9</a><br />
451 <td>Cross-Site Request Forgery in SWAT</td>
452 <td>all current releases</td>
453 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
454 <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
459 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
460 patch for Samba 3.3.15</a><br />
461 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
462 patch for Samba 3.4.13</a><br />
463 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
464 patch for Samba 3.5.9</a><br />
465 <td>Cross-Site Scripting vulnerability in SWAT</td>
466 <td>all current releases</td>
467 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
468 <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
473 <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
474 patch for Samba 3.3.14</a><br />
475 <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
476 patch for Samba 3.4.11</a><br />
477 <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
478 patch for Samba 3.5.6</a><br />
479 <td>Denial of service - memory corruption</td>
480 <td>all current releases</td>
481 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
482 <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
487 <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
488 patch for Samba 3.3.13</a><br />
489 <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
490 patch for Samba 3.4.8</a><br />
491 <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
492 patch for Samba 3.5.4</a><br />
493 <td>Buffer Overrun Vulnerability</td>
494 <td>all current releases</td>
495 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
496 <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
501 <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
502 patch for Samba 3.3.12 and 3.2.15</a><br />
503 <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
504 patch for Samba 3.0.37</a><br />
505 <td>Memory Corruption Vulnerability</td>
506 <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
507 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
508 <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
513 <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
514 patch for Samba 3.5.0</a><br />
515 <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
516 patch for Samba 3.4.6</a><br />
517 <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
518 patch for Samba 3.3.11</a><br />
519 <td>Permission ignored</td>
520 <td>3.3.11, 3.4.6, 3.5.0</td>
521 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
522 <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
527 <td>not available</td>
528 <td>Change parameter "wide links" to default to "no"</td>
530 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
531 <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
536 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
537 patch 1 for Samba 3.4.1</a>
538 <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
539 patch 2 for Samba 3.4.1</a>
540 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
541 patch 1 for Samba 3.3.7</a>
542 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
543 patch 2 for Samba 3.3.7</a>
544 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
545 patch 1 for Samba 3.2.14</a>
546 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
547 patch 2 for Samba 3.2.14</a>
548 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
549 patch 1 for Samba 3.0.36</a>
550 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
551 patch 2 for Samba 3.0.36</a>
552 <td>Information disclosure by setuid mount.cifs</td>
553 <td>all releases</td>
554 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
555 <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
560 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
561 patch for Samba 3.4.1</a><br />
562 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
563 patch for Samba 3.3.7</a><br />
564 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
565 patch for Samba 3.2.14</a><br />
566 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
567 patch for Samba 3.0.36</a><br />
568 <td>Remote DoS against smbd on authenticated connections</td>
569 <td>all releases</td>
570 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
571 <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
577 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
578 patch for Samba 3.4.1</a><br />
579 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
580 patch for Samba 3.3.7</a><br />
581 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
582 patch for Samba 3.2.14</a><br />
583 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
584 patch for Samba 3.0.36</a><br />
585 <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
587 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
588 <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
594 <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
595 patch for Samba 3.3.5</a><br />
596 <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
597 patch for Samba 3.2.12</a><br />
598 <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
599 patch for Samba 3.0.34</a><br />
600 <td>Uninitialized read of a data value</td>
601 <td>Samba 3.0.31 - 3.3.5</td>
602 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
603 <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
609 <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
610 patch for Samba 3.2.12</a>
611 <td>Formatstring vulnerability in smbclient</td>
612 <td>Samba 3.2.0 - 3.2.12</td>
613 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
614 <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
620 <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
621 patch for Samba 3.2.6</a>
622 <td>Potential access to "/" in setups with registry shares enabled</td>
623 <td>Samba 3.2.0 - 3.2.6</td>
624 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
625 <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
629 <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
630 patch for Samba 3.0.32</a>
631 <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
632 patch for Samba 3.2.4</a></td>
633 <td>Potential leak of arbitrary memory contents</td>
634 <td>Samba 3.0.29 - 3.2.4</td>
635 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
636 <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
641 <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
642 patch 1 for Samba 3.2.2</a>
643 <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
644 patch 2 for Samba 3.2.2</a></td>
645 <td>Wrong permissions of group_mapping.ldb</td>
646 <td>Samba 3.2.0 - 3.2.2</td>
647 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
648 <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
653 <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
654 <td>Boundary failure when parsing SMB responses</td>
655 <td>Samba 3.0.0 - 3.0.29</td>
656 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
657 <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
662 <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
663 <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
664 <td>Samba 3.0.0 - 3.0.27a</td>
665 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
666 <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
671 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
672 <td>Remote Code Execution in Samba's nmbd</td>
673 <td>Samba 3.0.0 - 3.0.26a</td>
674 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
675 <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
680 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
681 <td>GETDC mailslot processing buffer overrun in nmbd</td>
682 <td>Samba 3.0.0 - 3.0.26a</td>
683 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
684 <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
689 <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
690 <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
691 <td>Samba 3.0.25 - 3.0.25c</td>
692 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
693 <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
698 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
699 <td>Remote Command Injection Vulnerability (Updated June 5 to include missing "c" character from INCLUDE list).</td>
700 <td>Samba 3.0.0 - 3.0.25rc3</td>
701 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
702 <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
707 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
708 <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
709 <td>Samba 3.0.0 - 3.0.25rc3</td>
710 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
711 <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
716 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
717 <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the "force group" parameter).</td>
718 <td>Samba 3.0.23d - 3.0.25pre2</td>
719 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
720 <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
725 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
726 <td>Potential Denial of Service bug in smbd</td>
727 <td>Samba 3.0.6 - 3.0.23d</td>
728 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
729 <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
734 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
735 <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
736 <td>Samba 3.0.21 - 3.0.23d</td>
737 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
738 <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
743 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
744 <td>Format string bug in afsacl.so VFS plugin</td>
745 <td>Samba 3.0.6 - 3.0.23d</td>
746 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
747 <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
751 <td>10 July 2006</td>
752 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
753 <td>Memory exhaustion DoS against smbd</td>
754 <td>Samba 3.0.1 - 3.0.22</td>
755 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
756 <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
761 <td>30 March 2006</td>
762 <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
763 <td>Exposure of machine account credentials in winbind log files</td>
764 <td>Samba 3.0.21 - 3.0.21c</td>
765 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
766 <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
770 <td>16 December 2004</td>
771 <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
772 <td>Integer Overflow in security descriptor parsing</td>
773 <td>Samba 2.x, 3.0.x <= 3.0.9</td>
774 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
775 <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
780 <td>15 November 2004</td>
781 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
782 <td>Buffer Overrun in smbd</td>
783 <td>Samba 3.0.x <= 3.0.7</td>
784 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
785 <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
789 <td>8 November 2004</td>
790 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
792 <td>Samba 3.0.x <= 3.0.7</td>
793 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
794 <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
798 <td>30 September 2004</td>
799 <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
800 <td>Potential arbitrary file access</td>
801 <td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
802 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
803 <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
808 <td>13 Sept 2004</td>
809 <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
810 <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
811 <td>3.0.x <= 3.0.6</td>
812 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
813 <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
818 <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
819 <td>Two potential buffer overruns</td>
821 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
822 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
824 <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
825 <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
830 <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
831 <td>Buffer overrun in hash mangling method</td>
832 <td>all 2.2 releases</td>
833 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
835 <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
840 <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
841 <td align="left">Password initialization bug that could grant
842 an attacker unauthorized
843 access to a user account created by the mksmbpasswd.sh shell script.</td>
846 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
847 <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
852 <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
853 <td>Buffer overrun condition in the SMB/CIFS packet fragment
854 re-assembly code.</td>
855 <td>all 2.0 releases and <= 2.2.8</td>
856 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
857 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
858 <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
863 <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
864 <td>Bug in the length checking for encrypted password change
865 requests from clients.</td>
866 <td>2.2.2 - 2.2.6</td>
867 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
868 <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
873 <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
874 <td>Bug in expansion of certain smb.conf variables such as
875 %m that could grant an attacker the capability to overwrite arbitrary
876 files on the server. Bug that causes smbd not to honor the hosts allow
877 and deny smb.conf directives.</td>
880 <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
885 <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
886 <td>Bug in the handling of temporary files that allows local
887 users to destroy data on local devices.</td>
890 <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
895 <p><em>If you suspect you have discovered a serious security hole in a
896 Samba release, please send an email to <a
897 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
899 <!--#include virtual="footer_history.html" -->