1 <!--#include virtual="/samba/header.html" -->
2 <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
5 <h2>Samba Security Releases</h2>
7 <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
13 <table class="security_table">
14 <th colspan="6">Samba Security Releases</th>
16 <td><em>Date Issued</em></td>
17 <td><em>Download</em></td>
18 <td><em>Known Issue(s)</em></td>
19 <td><em>Affected Releases</em></td>
20 <td><em>CVE ID #</em></td>
21 <td><em>Details</em></td>
26 <td><a href="/samba/ftp/patches/security/samba-4.6.7-security-2017-09-20.patch">
27 patch for Samba 4.6.7</a><br />
28 <a href="/samba/ftp/patches/security/samba-4.5.13-security-2017-09-20.patch">
29 patch for Samba 4.5.13</a><br />
30 <a href="/samba/ftp/patches/security/samba-4.4.15-security-2017-09-20.patch">
31 patch for Samba 4.4.15</a><br />
32 <td>Numerous CVEs. Please see the announcements for details.
34 <td>please refer to the advisories</td>
35 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150">CVE-2017-12150</a>,
36 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151">CVE-2017-12151</a>,
37 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163">CVE-2017-12163</a>
39 <td><a href="/samba/security/CVE-2017-12150.html">Announcement</a>,
40 <a href="/samba/security/CVE-2017-12151.html">Announcement</a>,
41 <a href="/samba/security/CVE-2017-12163.html">Announcement</a>
47 <td><a href="/samba/ftp/patches/security/samba-4.x.y-CVE-2017-11103.patch">
48 patch for Samba 4.x.y</a><br />
49 <td>Orpheus' Lyre mutual authentication validation bypass.
51 <td>All versions between Samba 4.0.0 and 4.6.6/4.5.12/4.4.15</td>
52 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103">CVE-2017-11103</a>
54 <td><a href="/samba/security/CVE-2017-11103.html">Announcement</a>
60 <td><a href="/samba/ftp/patches/security/samba-4.6.3-4.5.9-4.4.13-CVE-2017-7494.patch">
61 patch for Samba 4.6.3, 4.5.9, 4.4.13</a><br />
62 <td>Remote code execution from a writable share.
64 <td>All versions between Samba 3.5.0 and 4.6.4/4.5.10/4.4.14</td>
65 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494">CVE-2017-7494</a>
67 <td><a href="/samba/security/CVE-2017-7494.html">Announcement</a>
73 <td><a href="/samba/ftp/patches/security/samba-4.6.0-CVE-2017-2619.patch">
74 patch for Samba 4.6.0</a><br />
75 <a href="/samba/ftp/patches/security/samba-4.5.6-CVE-2017-2619.patch">
76 patch for Samba 4.5.6</a><br />
77 <a href="/samba/ftp/patches/security/samba-4.4.11-CVE-2017-2619.patch">
78 patch for Samba 4.4.11</a><br />
79 <td>Symlink race allows access outside share definition.
81 <td>All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12</td>
82 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619">CVE-2017-2619</a>
84 <td><a href="/samba/security/CVE-2017-2619.html">Announcement</a>
90 <td><a href="/samba/ftp/patches/security/samba-4.5.2-security-20016-12-19.patch">
91 patch for Samba 4.5.2</a><br />
92 <a href="/samba/ftp/patches/security/samba-4.4.7-security-20016-12-19.patch">
93 patch for Samba 4.4.7</a><br />
94 <a href="/samba/ftp/patches/security/samba-4.3.12-security-20016-12-19.patch">
95 patch for Samba 4.3.12</a><br />
96 <td>Numerous CVEs. Please see the announcements for details.
98 <td>please refer to the advisories</td>
99 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123">CVE-2016-2123</a>,
100 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125">CVE-2016-2125</a>,
101 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126">CVE-2016-2126</a>
103 <td><a href="/samba/security/CVE-2016-2123.html">Announcement</a>,
104 <a href="/samba/security/CVE-2016-2125.html">Announcement</a>,
105 <a href="/samba/security/CVE-2016-2126.html">Announcement</a>
111 <td><a href="/samba/ftp/patches/security/samba-4.4.4-CVE-2016-2119.patch">
112 patch for Samba 4.4.4</a><br />
113 <a href="/samba/ftp/patches/security/samba-4.3.10-CVE-2016-2119.patch">
114 patch for Samba 4.3.10</a><br />
115 <a href="/samba/ftp/patches/security/samba-4.2.13-CVE-2016-2119.patch">
116 patch for Samba 4.2.13</a><br />
117 <td>Client side SMB2/3 required signing can be downgraded.
119 <td>4.0.0 - 4.4.4</td>
120 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119">CVE-2016-2119</a>
122 <td><a href="/samba/security/CVE-2016-2119.html">Announcement</a>
128 <td><a href="/samba/ftp/patches/security/samba-4.4.0-security-2016-04-12-final.patch">
129 patch for Samba 4.4.0</a><br />
130 <a href="/samba/ftp/patches/security/samba-4.3.6-security-2016-04-12-final.patch">
131 patch for Samba 4.3.6</a><br />
132 <a href="/samba/ftp/patches/security/samba-4.2.9-security-2016-04-12-final.patch">
133 patch for Samba 4.2.9</a><br />
134 <a href="/samba/ftp/patches/security/samba-v4-0-security-2016-04-12-fileserver-only.patch.xz">
135 patch for Samba 4.0.26 (fileserver only! no client! no domain controller!)</a><br />
136 <a href="/samba/ftp/patches/security/samba-v3-6-security-2016-04-12.tar.xz">
137 patch for Samba 3.6.25 (only related CVEs)</a><br />
138 <td>Numerous CVEs. Please see the announcements for details.
140 <td>please refer to the advisories</td>
141 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370">CVE-2015-5370</a>,
142 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110">CVE-2016-2110</a>,
143 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111">CVE-2016-2111</a>,
144 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112">CVE-2016-2112</a>,
145 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113">CVE-2016-2113</a>,
146 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114">CVE-2016-2114</a>,
147 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115">CVE-2016-2115</a>,
148 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118">CVE-2016-2118</a>
150 <td><a href="/samba/security/CVE-2015-5370.html">Announcement</a>
151 <a href="/samba/security/CVE-2016-2110.html">Announcement</a>
152 <a href="/samba/security/CVE-2016-2111.html">Announcement</a>
153 <a href="/samba/security/CVE-2016-2112.html">Announcement</a>
154 <a href="/samba/security/CVE-2016-2113.html">Announcement</a>
155 <a href="/samba/security/CVE-2016-2114.html">Announcement</a>
156 <a href="/samba/security/CVE-2016-2115.html">Announcement</a>
157 <a href="/samba/security/CVE-2016-2118.html">Announcement</a>
163 <td><a href="/samba/ftp/patches/security/samba-4.3.5-security-2016-03-08.patch">
164 patch for Samba 4.3.5</a><br />
165 <a href="/samba/ftp/patches/security/samba-4.2.8-security-2016-03-08.patch">
166 patch for Samba 4.2.8</a><br />
167 <a href="/samba/ftp/patches/security/samba-4.1.22-security-2016-03-08.patch">
168 patch for Samba 4.1.22</a><br />
169 <td>Incorrect ACL get/set allowed on symlink path, Out-of-bounds read in internal DNS server.
171 <td>please refer to the advisories</td>
172 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560">CVE-2015-7560</a>,
173 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771">CVE-2016-0771</a>,
175 <td><a href="/samba/security/CVE-2015-7560.html">Announcement</a>
176 <a href="/samba/security/CVE-2016-0771.html">Announcement</a>
182 <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
183 patch for Samba 4.3.2</a><br />
184 <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
185 patch for Samba 4.2.6</a><br />
186 <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
187 patch for Samba 4.1.21</a><br />
188 <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
189 patch for Samba 3.6.25</a><br />
190 <td>Numerous CVEs. Please see the announcements for details.
192 <td>3.0.0 to 4.3.2</td>
193 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>,
194 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>,
195 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>,
196 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>,
197 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>,
198 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>,
199 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
201 <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
202 <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
203 <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
204 <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
205 <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
206 <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
207 <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
213 <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
214 patch for Samba 4.1.16</a><br />
215 <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
216 patch for Samba 4.0.24</a><br />
217 <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
218 patch for Samba 3.6.24</a><br />
219 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
220 patch for Samba 3.5.22</a><br />
221 <td>Unexpected code execution in smbd.
223 <td>3.5.0 - 4.2.0rc4</td>
224 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
226 <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
232 <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
233 patch for Samba 4.1.15</a><br />
234 <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
235 patch for Samba 4.0.23</a><br />
236 <td>Elevation of privilege to Active Directory Domain Controller.
238 <td>4.0.0 - 4.1.15</td>
239 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
241 <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
247 <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
248 patch for Samba 4.1.10</a><br />
249 <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
250 patch for Samba 4.0.20</a><br />
251 <td>Remote code execution in nmbd.
253 <td>4.0.0 - 4.1.10</td>
254 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
256 <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
262 <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
263 patch for Samba 4.1.8</a><br />
264 <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
265 patch for Samba 4.0.18</a><br />
266 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
267 patch for Samba 3.6.23</a><br />
268 <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
270 <td>please refer to the advisories</td>
271 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>,
272 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
274 <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
275 <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
280 <td>03 June 2014</td>
281 <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
282 patch for Samba 4.0.17</a><br />
283 <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
284 patch for Samba 4.1.7</a><br />
285 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
286 patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
287 <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
289 <td>please refer to the advisories</td>
290 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>,
291 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
293 <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
294 <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
300 <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
301 patch for Samba 4.1.5</a><br />
302 <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
303 patch for Samba 4.0.15</a><br />
304 <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
305 patch for Samba 3.6.22</a><br />
306 <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
307 or directory ACL by mistake.
309 <td>please refer to the advisories</td>
310 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>,
311 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
313 <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
314 <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
320 <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
321 patch for Samba 4.1.2</a><br />
322 <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
323 patch for Samba 4.0.12</a><br />
324 <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
325 patch for Samba 3.6.21</a><br />
326 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
327 patch for Samba 3.5.22</a><br />
328 <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
329 patch for Samba 3.4.17</a>
330 <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
331 login without require_membership_of restrictions.</td>
332 <td>please refer to the advisories</td>
333 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>,
334 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
336 <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
337 <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
343 <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
344 patch for Samba 4.1.0</a><br />
345 <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
346 patch for Samba 4.0.10</a><br />
347 <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
348 patch for Samba 3.6.19</a><br />
349 <td>ACLs are not checked on opening an alternate data stream on a file
350 or directory, Private key in key.pem world readable.</td>
351 <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
352 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>,
353 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
355 <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
356 <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
362 <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
363 patch for Samba 4.0.7</a><br />
364 <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
365 patch for Samba 3.6.16</a><br />
366 <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
367 patch for Samba 3.5.21</a><br />
368 <td>Denial of service - CPU loop and memory allocation.</td>
371 href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
373 <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
379 <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
380 patch for Samba 3.6.5</a>
381 <td>A writable configured share might get read only</td>
382 <td>3.6.0 - 3.6.5 (inclusive)</td>
383 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
385 <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
391 <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
392 patch for Samba 4.0.3</a>
393 <td>World-writeable files may be created in additional shares on a Samba
395 <td>4.0.0rc6-4.0.3</td>
396 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
398 <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
404 <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
405 patch for Samba 4.0.1</a><br />
406 <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
407 patch for Samba 3.6.11</a><br />
408 <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
409 patch for Samba 3.5.20</a><br />
410 <td>Clickjacking issue and potential XSRF in SWAT.</td>
412 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>,
413 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
415 <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
416 <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
422 <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
423 patch for Samba 4.0.0</a>
424 <td>Samba 4.0 as an AD DC may provide authenticated users with write
425 access to LDAP directory objects.</td>
427 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
428 <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
433 <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
434 patch for Samba 3.4.16</a><br />
435 <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
436 patch for Samba 3.5.14</a><br />
437 <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
438 patch for Samba 3.6.4</a><br />
439 <td>Incorrect permission checks when granting/removing privileges can
440 compromise file server security.</td>
442 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
443 <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
448 <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
449 patch for Samba 3.0.37</a><br />
450 <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
451 patch for Samba 3.2.15</a><br />
452 <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
453 patch for Samba 3.3.16</a><br />
454 <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
455 patch for Samba 3.4.15</a><br />
456 <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
457 patch for Samba 3.5.13</a><br />
458 <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
459 patch for Samba 3.6.3</a><br />
460 <td>"root" credential remote code execution</td>
461 <td>all current releases</td>
462 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
463 <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
468 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
469 patch for Samba 3.0</a><br />
470 <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
471 patch for Samba 3.2</a><br />
472 <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
473 patch for Samba 3.3</a><br />
474 <td>Remote code execution vulnerability in smbd</td>
476 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
477 <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
482 <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
483 patch for Samba 3.6.2</a>
484 <td>Memory leak/Denial of service</td>
486 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
487 <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
492 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
493 patch for Samba 3.3.15</a><br />
494 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
495 patch for Samba 3.4.13</a><br />
496 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
497 patch for Samba 3.5.9</a><br />
498 <td>Cross-Site Request Forgery in SWAT</td>
499 <td>all current releases</td>
500 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
501 <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
506 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
507 patch for Samba 3.3.15</a><br />
508 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
509 patch for Samba 3.4.13</a><br />
510 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
511 patch for Samba 3.5.9</a><br />
512 <td>Cross-Site Scripting vulnerability in SWAT</td>
513 <td>all current releases</td>
514 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
515 <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
520 <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
521 patch for Samba 3.3.14</a><br />
522 <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
523 patch for Samba 3.4.11</a><br />
524 <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
525 patch for Samba 3.5.6</a><br />
526 <td>Denial of service - memory corruption</td>
527 <td>all current releases</td>
528 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
529 <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
534 <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
535 patch for Samba 3.3.13</a><br />
536 <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
537 patch for Samba 3.4.8</a><br />
538 <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
539 patch for Samba 3.5.4</a><br />
540 <td>Buffer Overrun Vulnerability</td>
541 <td>all current releases</td>
542 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
543 <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
548 <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
549 patch for Samba 3.3.12 and 3.2.15</a><br />
550 <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
551 patch for Samba 3.0.37</a><br />
552 <td>Memory Corruption Vulnerability</td>
553 <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
554 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
555 <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
560 <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
561 patch for Samba 3.5.0</a><br />
562 <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
563 patch for Samba 3.4.6</a><br />
564 <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
565 patch for Samba 3.3.11</a><br />
566 <td>Permission ignored</td>
567 <td>3.3.11, 3.4.6, 3.5.0</td>
568 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
569 <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
574 <td>not available</td>
575 <td>Change parameter "wide links" to default to "no"</td>
577 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
578 <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
583 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
584 patch 1 for Samba 3.4.1</a>
585 <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
586 patch 2 for Samba 3.4.1</a>
587 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
588 patch 1 for Samba 3.3.7</a>
589 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
590 patch 2 for Samba 3.3.7</a>
591 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
592 patch 1 for Samba 3.2.14</a>
593 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
594 patch 2 for Samba 3.2.14</a>
595 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
596 patch 1 for Samba 3.0.36</a>
597 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
598 patch 2 for Samba 3.0.36</a>
599 <td>Information disclosure by setuid mount.cifs</td>
600 <td>all releases</td>
601 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
602 <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
607 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
608 patch for Samba 3.4.1</a><br />
609 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
610 patch for Samba 3.3.7</a><br />
611 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
612 patch for Samba 3.2.14</a><br />
613 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
614 patch for Samba 3.0.36</a><br />
615 <td>Remote DoS against smbd on authenticated connections</td>
616 <td>all releases</td>
617 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
618 <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
624 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
625 patch for Samba 3.4.1</a><br />
626 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
627 patch for Samba 3.3.7</a><br />
628 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
629 patch for Samba 3.2.14</a><br />
630 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
631 patch for Samba 3.0.36</a><br />
632 <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
634 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
635 <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
641 <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
642 patch for Samba 3.3.5</a><br />
643 <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
644 patch for Samba 3.2.12</a><br />
645 <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
646 patch for Samba 3.0.34</a><br />
647 <td>Uninitialized read of a data value</td>
648 <td>Samba 3.0.31 - 3.3.5</td>
649 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
650 <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
656 <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
657 patch for Samba 3.2.12</a>
658 <td>Formatstring vulnerability in smbclient</td>
659 <td>Samba 3.2.0 - 3.2.12</td>
660 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
661 <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
667 <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
668 patch for Samba 3.2.6</a>
669 <td>Potential access to "/" in setups with registry shares enabled</td>
670 <td>Samba 3.2.0 - 3.2.6</td>
671 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
672 <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
676 <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
677 patch for Samba 3.0.32</a>
678 <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
679 patch for Samba 3.2.4</a></td>
680 <td>Potential leak of arbitrary memory contents</td>
681 <td>Samba 3.0.29 - 3.2.4</td>
682 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
683 <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
688 <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
689 patch 1 for Samba 3.2.2</a>
690 <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
691 patch 2 for Samba 3.2.2</a></td>
692 <td>Wrong permissions of group_mapping.ldb</td>
693 <td>Samba 3.2.0 - 3.2.2</td>
694 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
695 <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
700 <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
701 <td>Boundary failure when parsing SMB responses</td>
702 <td>Samba 3.0.0 - 3.0.29</td>
703 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
704 <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
709 <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
710 <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
711 <td>Samba 3.0.0 - 3.0.27a</td>
712 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
713 <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
718 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
719 <td>Remote Code Execution in Samba's nmbd</td>
720 <td>Samba 3.0.0 - 3.0.26a</td>
721 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
722 <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
727 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
728 <td>GETDC mailslot processing buffer overrun in nmbd</td>
729 <td>Samba 3.0.0 - 3.0.26a</td>
730 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
731 <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
736 <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
737 <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
738 <td>Samba 3.0.25 - 3.0.25c</td>
739 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
740 <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
745 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
746 <td>Remote Command Injection Vulnerability (Updated June 5 to include missing "c" character from INCLUDE list).</td>
747 <td>Samba 3.0.0 - 3.0.25rc3</td>
748 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
749 <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
754 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
755 <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
756 <td>Samba 3.0.0 - 3.0.25rc3</td>
757 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
758 <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
763 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
764 <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the "force group" parameter).</td>
765 <td>Samba 3.0.23d - 3.0.25pre2</td>
766 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
767 <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
772 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
773 <td>Potential Denial of Service bug in smbd</td>
774 <td>Samba 3.0.6 - 3.0.23d</td>
775 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
776 <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
781 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
782 <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
783 <td>Samba 3.0.21 - 3.0.23d</td>
784 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
785 <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
790 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
791 <td>Format string bug in afsacl.so VFS plugin</td>
792 <td>Samba 3.0.6 - 3.0.23d</td>
793 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
794 <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
798 <td>10 July 2006</td>
799 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
800 <td>Memory exhaustion DoS against smbd</td>
801 <td>Samba 3.0.1 - 3.0.22</td>
802 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
803 <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
808 <td>30 March 2006</td>
809 <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
810 <td>Exposure of machine account credentials in winbind log files</td>
811 <td>Samba 3.0.21 - 3.0.21c</td>
812 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
813 <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
817 <td>16 December 2004</td>
818 <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
819 <td>Integer Overflow in security descriptor parsing</td>
820 <td>Samba 2.x, 3.0.x <= 3.0.9</td>
821 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
822 <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
827 <td>15 November 2004</td>
828 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
829 <td>Buffer Overrun in smbd</td>
830 <td>Samba 3.0.x <= 3.0.7</td>
831 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
832 <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
836 <td>8 November 2004</td>
837 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
839 <td>Samba 3.0.x <= 3.0.7</td>
840 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
841 <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
845 <td>30 September 2004</td>
846 <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
847 <td>Potential arbitrary file access</td>
848 <td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
849 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
850 <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
855 <td>13 Sept 2004</td>
856 <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
857 <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
858 <td>3.0.x <= 3.0.6</td>
859 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
860 <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
865 <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
866 <td>Two potential buffer overruns</td>
868 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
869 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
871 <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
872 <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
877 <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
878 <td>Buffer overrun in hash mangling method</td>
879 <td>all 2.2 releases</td>
880 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
882 <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
887 <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
888 <td align="left">Password initialization bug that could grant
889 an attacker unauthorized
890 access to a user account created by the mksmbpasswd.sh shell script.</td>
893 href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
894 <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
899 <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
900 <td>Buffer overrun condition in the SMB/CIFS packet fragment
901 re-assembly code.</td>
902 <td>all 2.0 releases and <= 2.2.8</td>
903 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
904 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
905 <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
910 <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
911 <td>Bug in the length checking for encrypted password change
912 requests from clients.</td>
913 <td>2.2.2 - 2.2.6</td>
914 <td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
915 <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
920 <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
921 <td>Bug in expansion of certain smb.conf variables such as
922 %m that could grant an attacker the capability to overwrite arbitrary
923 files on the server. Bug that causes smbd not to honor the hosts allow
924 and deny smb.conf directives.</td>
927 <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
932 <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
933 <td>Bug in the handling of temporary files that allows local
934 users to destroy data on local devices.</td>
937 <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
942 <p><em>If you suspect you have discovered a serious security hole in a
943 Samba release, please send an email to <a
944 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
946 <!--#include virtual="footer_history.html" -->