NEWS[4.6.1]: Samba 4.6.1, 4.5.7 and 4.4.12 Security Releases Available for Download
[samba-web.git] / history / security.html
1 <!--#include virtual="/samba/header.html" --> 
2   <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
4
5 <h2>Samba Security Releases</h2>
6
7     <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
11
12
13     <table class="security_table">
14       <th colspan="6">Samba Security Releases</th>
15       <tr >
16         <td><em>Date Issued</em></td>
17         <td><em>Download</em></td>
18         <td><em>Known Issue(s)</em></td>
19         <td><em>Affected Releases</em></td>
20         <td><em>CVE ID #</em></td>
21         <td><em>Details</em></td>
22       </tr>
23
24     <tr>
25         <td>23 Mar 2017</td>
26         <td><a href="/samba/ftp/patches/security/samba-4.6.0-CVE-2017-2619.patch">
27         patch for Samba 4.6.0</a><br />
28         <a href="/samba/ftp/patches/security/samba-4.5.6-CVE-2017-2619.patch">
29         patch for Samba 4.5.6</a><br />
30         <a href="/samba/ftp/patches/security/samba-4.4.11-CVE-2017-2619.patch">
31         patch for Samba 4.4.11</a><br />
32         <td>Symlink race allows access outside share definition.
33         </td>
34         <td>All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12</td>
35         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619">CVE-2017-2619</a>
36         </td>
37         <td><a href="/samba/security/CVE-2017-2619.html">Announcement</a>
38         </td>
39     </tr>
40
41     <tr>
42         <td>19 Dec 2016</td>
43         <td><a href="/samba/ftp/patches/security/samba-4.5.2-security-20016-12-19.patch">
44         patch for Samba 4.5.2</a><br />
45         <a href="/samba/ftp/patches/security/samba-4.4.7-security-20016-12-19.patch">
46         patch for Samba 4.4.7</a><br />
47         <a href="/samba/ftp/patches/security/samba-4.3.12-security-20016-12-19.patch">
48         patch for Samba 4.3.12</a><br />
49         <td>Numerous CVEs. Please see the announcements for details.
50         </td>
51         <td>please refer to the advisories</td>
52         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123">CVE-2016-2123</a>, 
53             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125">CVE-2016-2125</a>, 
54             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126">CVE-2016-2126</a>
55         </td>
56         <td><a href="/samba/security/CVE-2016-2123.html">Announcement</a>, 
57             <a href="/samba/security/CVE-2016-2125.html">Announcement</a>, 
58             <a href="/samba/security/CVE-2016-2126.html">Announcement</a>
59         </td>
60     </tr>
61
62     <tr>
63         <td>07 Jul 2016</td>
64         <td><a href="/samba/ftp/patches/security/samba-4.4.4-CVE-2016-2119.patch">
65         patch for Samba 4.4.4</a><br />
66         <a href="/samba/ftp/patches/security/samba-4.3.10-CVE-2016-2119.patch">
67         patch for Samba 4.3.10</a><br />
68         <a href="/samba/ftp/patches/security/samba-4.2.13-CVE-2016-2119.patch">
69         patch for Samba 4.2.13</a><br />
70         <td>Client side SMB2/3 required signing can be downgraded.
71         </td>
72         <td>4.0.0 - 4.4.4</td>
73         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119">CVE-2016-2119</a>
74         </td>
75         <td><a href="/samba/security/CVE-2016-2119.html">Announcement</a>
76         </td>
77     </tr>
78
79     <tr>
80         <td>12 Apr 2016</td>
81         <td><a href="/samba/ftp/patches/security/samba-4.4.0-security-2016-04-12-final.patch">
82         patch for Samba 4.4.0</a><br />
83         <a href="/samba/ftp/patches/security/samba-4.3.6-security-2016-04-12-final.patch">
84         patch for Samba 4.3.6</a><br />
85         <a href="/samba/ftp/patches/security/samba-4.2.9-security-2016-04-12-final.patch">
86         patch for Samba 4.2.9</a><br />
87         <a href="/samba/ftp/patches/security/samba-v4-0-security-2016-04-12-fileserver-only.patch.xz">
88         patch for Samba 4.0.26 (fileserver only! no client! no domain controller!)</a><br />
89         <a href="/samba/ftp/patches/security/samba-v3-6-security-2016-04-12.tar.xz">
90         patch for Samba 3.6.25 (only related CVEs)</a><br />
91         <td>Numerous CVEs. Please see the announcements for details.
92         </td>
93         <td>please refer to the advisories</td>
94         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370">CVE-2015-5370</a>, 
95             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110">CVE-2016-2110</a>, 
96             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111">CVE-2016-2111</a>, 
97             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112">CVE-2016-2112</a>, 
98             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113">CVE-2016-2113</a>, 
99             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114">CVE-2016-2114</a>, 
100             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115">CVE-2016-2115</a>, 
101             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118">CVE-2016-2118</a>
102         </td>
103         <td><a href="/samba/security/CVE-2015-5370.html">Announcement</a>
104             <a href="/samba/security/CVE-2016-2110.html">Announcement</a>
105             <a href="/samba/security/CVE-2016-2111.html">Announcement</a>
106             <a href="/samba/security/CVE-2016-2112.html">Announcement</a>
107             <a href="/samba/security/CVE-2016-2113.html">Announcement</a>
108             <a href="/samba/security/CVE-2016-2114.html">Announcement</a>
109             <a href="/samba/security/CVE-2016-2115.html">Announcement</a>
110             <a href="/samba/security/CVE-2016-2118.html">Announcement</a>
111         </td>
112     </tr>
113
114     <tr>
115         <td>08 Mar 2016</td>
116         <td><a href="/samba/ftp/patches/security/samba-4.3.5-security-2016-03-08.patch">
117         patch for Samba 4.3.5</a><br />
118         <a href="/samba/ftp/patches/security/samba-4.2.8-security-2016-03-08.patch">
119         patch for Samba 4.2.8</a><br />
120         <a href="/samba/ftp/patches/security/samba-4.1.22-security-2016-03-08.patch">
121         patch for Samba 4.1.22</a><br />
122         <td>Incorrect ACL get/set allowed on symlink path, Out-of-bounds read in internal DNS server.
123         </td>
124         <td>please refer to the advisories</td>
125         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560">CVE-2015-7560</a>, 
126             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771">CVE-2016-0771</a>, 
127         </td>
128         <td><a href="/samba/security/CVE-2015-7560.html">Announcement</a>
129             <a href="/samba/security/CVE-2016-0771.html">Announcement</a>
130         </td>
131     </tr>
132
133     <tr>
134         <td>16 Dec 2015</td>
135         <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
136         patch for Samba 4.3.2</a><br />
137         <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
138         patch for Samba 4.2.6</a><br />
139         <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
140         patch for Samba 4.1.21</a><br />
141         <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
142         patch for Samba 3.6.25</a><br />
143         <td>Numerous CVEs. Please see the announcements for details.
144         </td>
145         <td>3.0.0 to 4.3.2</td>
146         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>, 
147             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>, 
148             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>, 
149             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>, 
150             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>, 
151             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>, 
152             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
153         </td>
154         <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
155             <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
156             <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
157             <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
158             <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
159             <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
160             <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
161         </td>
162     </tr>
163
164     <tr>
165         <td>23 Feb 2015</td>
166         <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
167         patch for Samba 4.1.16</a><br />
168         <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
169         patch for Samba 4.0.24</a><br />
170         <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
171         patch for Samba 3.6.24</a><br />
172         <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
173         patch for Samba 3.5.22</a><br />
174         <td>Unexpected code execution in smbd.
175         </td>
176         <td>3.5.0 - 4.2.0rc4</td>
177         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
178         </td>
179         <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
180         </td>
181     </tr>
182
183     <tr>
184         <td>15 Jan 2015</td>
185         <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
186         patch for Samba 4.1.15</a><br />
187         <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
188         patch for Samba 4.0.23</a><br />
189         <td>Elevation of privilege to Active Directory Domain Controller.
190         </td>
191         <td>4.0.0 - 4.1.15</td>
192         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
193         </td>
194         <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
195         </td>
196     </tr>
197
198     <tr>
199         <td>01 Aug 2014</td>
200         <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
201         patch for Samba 4.1.10</a><br />
202         <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
203         patch for Samba 4.0.20</a><br />
204         <td>Remote code execution in nmbd.
205         </td>
206         <td>4.0.0 - 4.1.10</td>
207         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
208         </td>
209         <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
210         </td>
211     </tr>
212
213     <tr>
214         <td>23 Jun 2014</td>
215         <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
216         patch for Samba 4.1.8</a><br />
217         <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
218         patch for Samba 4.0.18</a><br />
219         <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
220         patch for Samba 3.6.23</a><br />
221         <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
222         </td>
223         <td>please refer to the advisories</td>
224         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>, 
225             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
226         </td>
227         <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
228             <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
229         </td>
230     </tr>
231
232     <tr>
233         <td>03 June 2014</td>
234         <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
235         patch for Samba 4.0.17</a><br />
236         <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
237         patch for Samba 4.1.7</a><br />
238         <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
239         patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
240         <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
241         </td>
242         <td>please refer to the advisories</td>
243         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>, 
244             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
245         </td>
246         <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
247             <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
248         </td>
249     </tr>
250
251     <tr>
252         <td>11 Mar 2014</td>
253         <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
254         patch for Samba 4.1.5</a><br />
255         <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
256         patch for Samba 4.0.15</a><br />
257         <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
258         patch for Samba 3.6.22</a><br />
259         <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
260         or directory ACL by mistake.
261         </td>
262         <td>please refer to the advisories</td>
263         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>, 
264             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
265         </td>
266         <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
267             <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
268         </td>
269     </tr>
270
271     <tr>
272         <td>09 Dec 2013</td>
273         <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
274         patch for Samba 4.1.2</a><br />
275         <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
276         patch for Samba 4.0.12</a><br />
277         <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
278         patch for Samba 3.6.21</a><br />
279         <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
280         patch for Samba 3.5.22</a><br />
281         <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
282         patch for Samba 3.4.17</a>
283         <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
284         login without require_membership_of restrictions.</td>
285         <td>please refer to the advisories</td>
286         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>, 
287             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
288         </td>
289         <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
290             <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
291         </td>
292     </tr>
293
294     <tr>
295         <td>11 Nov 2013</td>
296         <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
297         patch for Samba 4.1.0</a><br />
298         <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
299         patch for Samba 4.0.10</a><br />
300         <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
301         patch for Samba 3.6.19</a><br />
302         <td>ACLs are not checked on opening an alternate data stream on a file
303             or directory, Private key in key.pem world readable.</td>
304         <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
305         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>, 
306             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
307         </td>
308         <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
309             <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
310         </td>
311     </tr>
312
313     <tr>
314         <td>05 Aug 2013</td>
315         <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
316         patch for Samba 4.0.7</a><br />
317         <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
318         patch for Samba 3.6.16</a><br />
319         <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
320         patch for Samba 3.5.21</a><br />
321         <td>Denial of service - CPU loop and memory allocation.</td>
322         <td>3.0.x-4.0.7</td>
323         <td><a
324         href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
325         </td>
326         <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
327         </td>
328     </tr>
329
330     <tr>
331         <td>02 Apr 2013</td>
332         <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
333         patch for Samba 3.6.5</a>
334         <td>A writable configured share might get read only</td>
335         <td>3.6.0 - 3.6.5 (inclusive)</td>
336         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
337         </td>
338         <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
339         </td>
340     </tr>
341
342     <tr>
343         <td>19 Mar 2013</td>
344         <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
345         patch for Samba 4.0.3</a>
346         <td>World-writeable files may be created in additional shares on a Samba
347         4.0 AD DC.</td>
348         <td>4.0.0rc6-4.0.3</td>
349         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
350         </td>
351         <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
352         </td>
353     </tr>
354
355     <tr>
356         <td>30 Jan 2013</td>
357         <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
358         patch for Samba 4.0.1</a><br />
359         <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
360         patch for Samba 3.6.11</a><br />
361         <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
362         patch for Samba 3.5.20</a><br />
363         <td>Clickjacking issue and potential XSRF in SWAT.</td>
364         <td>3.0.x-4.0.1</td>
365         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>, 
366             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
367         </td>
368         <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
369             <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
370         </td>
371     </tr>
372
373     <tr>
374         <td>15 Jan 2013</td>
375         <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
376         patch for Samba 4.0.0</a>
377         <td>Samba 4.0 as an AD DC may provide authenticated users with write
378         access to LDAP directory objects.</td>
379         <td>4.0.0</td>
380         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
381         <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
382     </tr>
383
384     <tr>
385         <td>30 Apr 2012</td>
386         <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
387         patch for Samba 3.4.16</a><br />
388         <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
389         patch for Samba 3.5.14</a><br />
390         <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
391         patch for Samba 3.6.4</a><br />
392         <td>Incorrect permission checks when granting/removing privileges can
393         compromise file server security.</td>
394         <td>3.4.x-3.6.4</td>
395         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
396         <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
397     </tr>
398
399     <tr>
400         <td>10 Apr 2012</td>
401         <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
402         patch for Samba 3.0.37</a><br />
403         <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
404         patch for Samba 3.2.15</a><br />
405         <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
406         patch for Samba 3.3.16</a><br />
407         <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
408         patch for Samba 3.4.15</a><br />
409         <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
410         patch for Samba 3.5.13</a><br />
411         <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
412         patch for Samba 3.6.3</a><br />
413         <td>"root" credential remote code execution</td>
414         <td>all current releases</td>
415         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
416         <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
417     </tr>
418
419     <tr>
420         <td>23 Feb 2012</td>
421         <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
422         patch for Samba 3.0</a><br />
423         <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
424         patch for Samba 3.2</a><br />
425         <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
426         patch for Samba 3.3</a><br />
427         <td>Remote code execution vulnerability in smbd</td>
428         <td>pre-3.4</td>
429         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
430         <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
431     </tr>
432
433     <tr>
434         <td>29 Jan 2012</td>
435         <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
436         patch for Samba 3.6.2</a>
437         <td>Memory leak/Denial of service</td>
438         <td>3.6.0-3.6.2</td>
439         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
440         <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
441     </tr>
442
443     <tr>
444         <td>26 Jul 2011</td>
445         <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
446         patch for Samba 3.3.15</a><br />
447         <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
448         patch for Samba 3.4.13</a><br />
449         <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
450         patch for Samba 3.5.9</a><br />
451         <td>Cross-Site Request Forgery in SWAT</td>
452         <td>all current releases</td>
453         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
454         <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
455     </tr>
456
457     <tr>
458         <td>26 Jul 2011</td>
459         <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
460         patch for Samba 3.3.15</a><br />
461         <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
462         patch for Samba 3.4.13</a><br />
463         <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
464         patch for Samba 3.5.9</a><br />
465         <td>Cross-Site Scripting vulnerability in SWAT</td>
466         <td>all current releases</td>
467         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
468         <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
469     </tr>
470
471     <tr>
472         <td>18 Feb 2011</td>
473         <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
474         patch for Samba 3.3.14</a><br />
475         <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
476         patch for Samba 3.4.11</a><br />
477         <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
478         patch for Samba 3.5.6</a><br />
479         <td>Denial of service - memory corruption</td>
480         <td>all current releases</td>
481         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
482         <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
483     </tr>
484
485     <tr>
486         <td>14 Sep 2010</td>
487         <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
488         patch for Samba 3.3.13</a><br />
489         <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
490         patch for Samba 3.4.8</a><br />
491         <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
492         patch for Samba 3.5.4</a><br />
493         <td>Buffer Overrun Vulnerability</td>
494         <td>all current releases</td>
495         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
496         <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
497     </tr>
498
499     <tr>
500         <td>16 Jun 2010</td>
501         <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
502         patch for Samba 3.3.12 and 3.2.15</a><br />
503         <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
504         patch for Samba 3.0.37</a><br />
505         <td>Memory Corruption Vulnerability</td>
506         <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
507         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
508         <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
509     </tr>
510
511     <tr>
512         <td>08 Mar 2010</td>
513         <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
514         patch for Samba 3.5.0</a><br />
515         <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
516         patch for Samba 3.4.6</a><br />
517         <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
518         patch for Samba 3.3.11</a><br />
519         <td>Permission ignored</td>
520         <td>3.3.11, 3.4.6, 3.5.0</td>
521         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
522         <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
523     </tr>
524
525     <tr>
526         <td>02 Feb 2010</td>
527                   <td>not available</td>
528         <td>Change parameter "wide links" to default to "no"</td>
529         <td>pre-3.4.6</td>
530         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
531         <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
532     </tr>
533
534     <tr>
535         <td>01 Oct 2009</td>
536         <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
537         patch 1 for Samba 3.4.1</a>
538         <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
539         patch 2 for Samba 3.4.1</a>
540         <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
541         patch 1 for Samba 3.3.7</a>
542         <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
543         patch 2 for Samba 3.3.7</a>
544         <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
545         patch 1 for Samba 3.2.14</a>
546         <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
547         patch 2 for Samba 3.2.14</a>
548         <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
549         patch 1 for Samba 3.0.36</a>
550         <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
551         patch 2 for Samba 3.0.36</a>
552         <td>Information disclosure by setuid mount.cifs</td>
553         <td>all releases</td>
554         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
555         <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
556     </tr>
557
558     <tr>
559         <td>01 Oct 2009</td>
560         <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
561         patch for Samba 3.4.1</a><br />
562         <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
563         patch for Samba 3.3.7</a><br />
564         <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
565         patch for Samba 3.2.14</a><br />
566         <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
567         patch for Samba 3.0.36</a><br />
568         <td>Remote DoS against smbd on authenticated connections</td>
569         <td>all releases</td>
570         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
571         <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
572     </tr>
573     <tr>
574
575     <tr>
576         <td>01 Oct 2009</td>
577         <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
578         patch for Samba 3.4.1</a><br />
579         <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
580         patch for Samba 3.3.7</a><br />
581         <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
582         patch for Samba 3.2.14</a><br />
583         <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
584         patch for Samba 3.0.36</a><br />
585         <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
586         <td>&gt; 3.0.11</td>
587         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
588         <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
589     </tr>
590     <tr>
591
592     <tr>
593         <td>23 Jun 2009</td>
594         <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
595         patch for Samba 3.3.5</a><br />
596         <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
597         patch for Samba 3.2.12</a><br />
598         <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
599         patch for Samba 3.0.34</a><br />
600         <td>Uninitialized read of a data value</td>
601         <td>Samba 3.0.31 - 3.3.5</td>
602         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
603         <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
604     </tr>
605     <tr>
606
607     <tr>
608         <td>23 Jun 2009</td>
609         <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
610         patch for Samba 3.2.12</a>
611         <td>Formatstring vulnerability in smbclient</td>
612         <td>Samba 3.2.0 - 3.2.12</td>
613         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
614         <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
615     </tr>
616     <tr>
617
618     <tr>
619         <td>05 Jan 2009</td>
620         <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
621         patch for Samba 3.2.6</a>
622         <td>Potential access to "/" in setups with registry shares enabled</td>
623         <td>Samba 3.2.0 - 3.2.6</td>
624         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
625         <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
626     </tr>
627     <tr>
628         <td>27 Nov 2008</td>
629         <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
630         patch for Samba 3.0.32</a>
631         <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
632         patch for Samba 3.2.4</a></td>
633         <td>Potential leak of arbitrary memory contents</td>
634         <td>Samba 3.0.29 - 3.2.4</td>
635         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
636         <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
637     </tr>
638
639     <tr>
640         <td>27 Aug 2008</td>
641         <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
642         patch 1 for Samba 3.2.2</a> 
643         <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
644         patch 2 for Samba 3.2.2</a></td>
645         <td>Wrong permissions of group_mapping.ldb</td>
646         <td>Samba 3.2.0 - 3.2.2</td>
647         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
648         <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
649     </tr>
650
651     <tr>
652         <td>29 May 2008</td>
653         <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
654         <td>Boundary failure when parsing SMB responses</td>
655         <td>Samba 3.0.0 - 3.0.29</td>
656         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
657         <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
658     </tr>
659
660     <tr>
661         <td>10 Dec 2007</td>
662         <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
663         <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
664         <td>Samba 3.0.0 - 3.0.27a</td>
665         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
666         <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
667     </tr>
668
669     <tr>
670         <td>15 Nov 2007</td>
671         <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
672         <td>Remote Code Execution in Samba's nmbd</td>
673         <td>Samba 3.0.0 - 3.0.26a</td>
674         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
675         <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
676     </tr>
677
678     <tr>
679         <td>15 Nov 2007</td>
680         <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
681         <td>GETDC mailslot processing buffer overrun in nmbd</td>
682         <td>Samba 3.0.0 - 3.0.26a</td>
683         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
684         <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
685     </tr>
686
687     <tr>
688         <td>11 Sep 2007</td>
689         <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
690         <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
691         <td>Samba 3.0.25 - 3.0.25c</td>
692         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
693         <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
694     </tr>
695
696     <tr>
697         <td>14 May 2007</td>
698         <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
699         <td>Remote Command Injection Vulnerability (Updated June 5 to include missing &quot;c&quot; character from INCLUDE list).</td>
700         <td>Samba 3.0.0 - 3.0.25rc3</td>
701         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
702         <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
703     </tr>
704
705     <tr>
706         <td>14 May 2007</td>
707         <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
708         <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
709         <td>Samba 3.0.0 - 3.0.25rc3</td>
710         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
711         <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
712     </tr>
713
714     <tr>
715         <td>14 May 2007</td>
716         <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
717         <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the &quot;force group&quot; parameter).</td>
718         <td>Samba 3.0.23d - 3.0.25pre2</td>
719         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
720         <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
721     </tr>
722
723     <tr>
724         <td>5 Feb 2007</td>
725         <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
726         <td>Potential Denial of Service bug in smbd</td>
727         <td>Samba 3.0.6 - 3.0.23d</td>
728         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
729         <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
730     </tr>
731
732     <tr>
733         <td>5 Feb 2007</td>
734         <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
735         <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
736         <td>Samba 3.0.21 - 3.0.23d</td>
737         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
738         <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
739     </tr>
740
741     <tr>
742         <td>5 Feb 2007</td>
743         <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
744         <td>Format string bug in afsacl.so VFS plugin</td>
745         <td>Samba 3.0.6 - 3.0.23d</td>
746         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
747         <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
748     </tr>
749
750     <tr>
751         <td>10 July 2006</td>
752         <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
753         <td>Memory exhaustion DoS against smbd</td>
754         <td>Samba 3.0.1 - 3.0.22</td>
755         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
756         <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
757     </tr>
758
759     <tr>
760     <tr>
761         <td>30 March 2006</td>
762         <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
763         <td>Exposure of machine account credentials in winbind log files</td>
764         <td>Samba 3.0.21 - 3.0.21c</td>
765         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
766         <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
767     </tr>
768
769     <tr>
770         <td>16 December 2004</td>
771         <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
772         <td>Integer Overflow in security descriptor parsing</td>
773         <td>Samba 2.x, 3.0.x &lt;&#61; 3.0.9</td>
774         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
775         <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
776     </tr>    
777
778     <tr>
779     <tr>
780         <td>15 November 2004</td>
781         <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for &lt;&#61;Samba 3.0.7</a></td>
782         <td>Buffer Overrun in smbd</td>
783         <td>Samba 3.0.x &lt;&#61; 3.0.7</td>
784         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
785         <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
786     </tr>    
787
788     <tr>
789         <td>8 November 2004</td>
790         <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for &lt;&#61;Samba 3.0.7</a></td>
791         <td>Remote DoS</td>
792         <td>Samba 3.0.x &lt;&#61; 3.0.7</td>
793         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
794         <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
795     </tr>    
796
797     <tr>
798         <td>30 September 2004</td>
799         <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or  <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for &lt;&#61;Samba 3.0.2a</a></td>
800         <td>Potential arbitrary file access</td>
801         <td>Samba 2.2.x &lt;&#61;2.2.11 and Samba 3.0.x &lt;&#61;3.0.2a</td>
802         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
803         <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
804     </tr>    
805         
806       
807       <tr>
808         <td>13 Sept 2004</td>
809         <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
810         <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
811         <td>3.0.x &lt;= 3.0.6</td>
812         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
813         <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
814       </tr>
815       
816       <tr>
817         <td>22 Jul 2004</td>
818         <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
819         <td>Two potential buffer overruns</td>
820         <td>>=3.0.2</td>
821         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>, 
822             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
823         </td>
824         <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
825             <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
826       </tr>
827       
828       <tr>
829         <td>22 Jul 2004</td>
830         <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
831         <td>Buffer overrun in hash mangling method</td>
832         <td>all 2.2 releases</td>
833         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
834         </td>
835         <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
836       </tr>
837       
838       <tr>
839         <td>9 Feb 2004</td>
840         <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
841         <td align="left">Password initialization bug that could grant
842         an attacker unauthorized
843         access to a user account created by the mksmbpasswd.sh shell script.</td>
844         <td>>=3.0.0</td>
845         <td><a
846         href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
847         <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
848       </tr>
849       
850       <tr>
851         <td>7 Apr 2003</td>
852         <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
853         <td>Buffer overrun condition in the SMB/CIFS packet fragment
854         re-assembly code.</td>
855         <td>all 2.0 releases and <= 2.2.8</td>
856         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
857         <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
858         <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
859       </tr>
860       
861       <tr>
862         <td>10 Dec 2002</td>
863         <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
864         <td>Bug in the length checking for encrypted password change
865         requests from clients.</td>
866         <td>2.2.2 - 2.2.6</td>
867         <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
868         <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
869       </tr>
870       
871       <tr>
872         <td>23 Jun 2001</td>
873         <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
874         <td>Bug in expansion of certain smb.conf variables such as 
875         %m that could grant an attacker the capability to overwrite arbitrary 
876         files on the server.  Bug that causes smbd not to honor the hosts allow 
877         and deny smb.conf directives.</td>
878         <td>2.2.0</td>
879         <td>&nbsp</td>
880         <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
881       </tr>
882       
883       <tr>
884         <td>23 Jun 2001</td>
885         <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
886         <td>Bug in the handling of temporary files that allows local 
887         users to destroy data on local devices.</td>
888         <td>>= 2.0.0</td>
889         <td>&nbsp</td>
890         <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
891       </tr>
892                 
893     </table>
894     
895     <p><em>If you suspect you have discovered a serious security hole in a
896 Samba release, please send an email to <a
897 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
898
899 <!--#include virtual="footer_history.html" -->