1 <!--#include virtual="/samba/header.html" -->
2 <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
5 <h2>Samba Security Releases</h2>
7 <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
13 <table class="security_table">
14 <th colspan="6">Samba Security Releases</th>
16 <td><em>Date Issued</em></td>
17 <td><em>Download</em></td>
18 <td><em>Known Issue(s)</em></td>
19 <td><em>Affected Releases</em></td>
20 <td><em>CVE ID #</em></td>
21 <td><em>Details</em></td>
26 <td><a href="/samba/ftp/patches/security/samba-4.4.0-security-2016-04-12.patch">
27 patch for Samba 4.4.0</a><br />
28 <a href="/samba/ftp/patches/security/samba-4.3.6-security-2016-04-12.patch">
29 patch for Samba 4.3.6</a><br />
30 <a href="/samba/ftp/patches/security/samba-4.2.9-security-2016-04-12.patch">
31 patch for Samba 4.2.9</a><br />
32 <td>Numerous CVEs. Please see the announcements for details.
34 <td>please refer to the advisories</td>
35 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370">CVE-2015-5370</a>,
36 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110">CVE-2016-2110</a>,
37 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111">CVE-2016-2111</a>,
38 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112">CVE-2016-2112</a>,
39 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113">CVE-2016-2113</a>,
40 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114">CVE-2016-2114</a>,
41 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115">CVE-2016-2115</a>,
42 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118">CVE-2016-2118</a>
44 <td><a href="/samba/security/CVE-2015-5370.html">Announcement</a>
45 <a href="/samba/security/CVE-2016-2110.html">Announcement</a>
46 <a href="/samba/security/CVE-2016-2111.html">Announcement</a>
47 <a href="/samba/security/CVE-2016-2112.html">Announcement</a>
48 <a href="/samba/security/CVE-2016-2113.html">Announcement</a>
49 <a href="/samba/security/CVE-2016-2114.html">Announcement</a>
50 <a href="/samba/security/CVE-2016-2115.html">Announcement</a>
51 <a href="/samba/security/CVE-2016-2118.html">Announcement</a>
57 <td><a href="/samba/ftp/patches/security/samba-4.3.5-security-2016-03-08.patch">
58 patch for Samba 4.3.5</a><br />
59 <a href="/samba/ftp/patches/security/samba-4.2.8-security-2016-03-08.patch">
60 patch for Samba 4.2.8</a><br />
61 <a href="/samba/ftp/patches/security/samba-4.1.22-security-2016-03-08.patch">
62 patch for Samba 4.1.22</a><br />
63 <td>Incorrect ACL get/set allowed on symlink path, Out-of-bounds read in internal DNS server.
65 <td>please refer to the advisories</td>
66 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560">CVE-2015-7560</a>,
67 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771">CVE-2016-0771</a>,
69 <td><a href="/samba/security/CVE-2015-7560.html">Announcement</a>
70 <a href="/samba/security/CVE-2016-0771.html">Announcement</a>
76 <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
77 patch for Samba 4.3.2</a><br />
78 <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
79 patch for Samba 4.2.6</a><br />
80 <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
81 patch for Samba 4.1.21</a><br />
82 <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
83 patch for Samba 3.6.25</a><br />
84 <td>Numerous CVEs. Please see the announcements for details.
86 <td>3.0.0 to 4.3.2</td>
87 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>,
88 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>,
89 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>,
90 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>,
91 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>,
92 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>,
93 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
95 <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
96 <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
97 <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
98 <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
99 <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
100 <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
101 <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
107 <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
108 patch for Samba 4.1.16</a><br />
109 <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
110 patch for Samba 4.0.24</a><br />
111 <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
112 patch for Samba 3.6.24</a><br />
113 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
114 patch for Samba 3.5.22</a><br />
115 <td>Unexpected code execution in smbd.
117 <td>3.5.0 - 4.2.0rc4</td>
118 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
120 <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
126 <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
127 patch for Samba 4.1.15</a><br />
128 <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
129 patch for Samba 4.0.23</a><br />
130 <td>Elevation of privilege to Active Directory Domain Controller.
132 <td>4.0.0 - 4.1.15</td>
133 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
135 <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
141 <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
142 patch for Samba 4.1.10</a><br />
143 <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
144 patch for Samba 4.0.20</a><br />
145 <td>Remote code execution in nmbd.
147 <td>4.0.0 - 4.1.10</td>
148 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
150 <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
156 <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
157 patch for Samba 4.1.8</a><br />
158 <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
159 patch for Samba 4.0.18</a><br />
160 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
161 patch for Samba 3.6.23</a><br />
162 <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
164 <td>please refer to the advisories</td>
165 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>,
166 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
168 <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
169 <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
174 <td>03 June 2014</td>
175 <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
176 patch for Samba 4.0.17</a><br />
177 <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
178 patch for Samba 4.1.7</a><br />
179 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
180 patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
181 <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
183 <td>please refer to the advisories</td>
184 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>,
185 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
187 <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
188 <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
194 <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
195 patch for Samba 4.1.5</a><br />
196 <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
197 patch for Samba 4.0.15</a><br />
198 <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
199 patch for Samba 3.6.22</a><br />
200 <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
201 or directory ACL by mistake.
203 <td>please refer to the advisories</td>
204 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>,
205 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
207 <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
208 <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
214 <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
215 patch for Samba 4.1.2</a><br />
216 <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
217 patch for Samba 4.0.12</a><br />
218 <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
219 patch for Samba 3.6.21</a><br />
220 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
221 patch for Samba 3.5.22</a><br />
222 <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
223 patch for Samba 3.4.17</a>
224 <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
225 login without require_membership_of restrictions.</td>
226 <td>please refer to the advisories</td>
227 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>,
228 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
230 <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
231 <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
237 <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
238 patch for Samba 4.1.0</a><br />
239 <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
240 patch for Samba 4.0.10</a><br />
241 <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
242 patch for Samba 3.6.19</a><br />
243 <td>ACLs are not checked on opening an alternate data stream on a file
244 or directory, Private key in key.pem world readable.</td>
245 <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
246 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>,
247 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
249 <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
250 <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
256 <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
257 patch for Samba 4.0.7</a><br />
258 <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
259 patch for Samba 3.6.16</a><br />
260 <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
261 patch for Samba 3.5.21</a><br />
262 <td>Denial of service - CPU loop and memory allocation.</td>
265 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
267 <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
273 <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
274 patch for Samba 3.6.5</a>
275 <td>A writable configured share might get read only</td>
276 <td>3.6.0 - 3.6.5 (inclusive)</td>
277 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
279 <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
285 <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
286 patch for Samba 4.0.3</a>
287 <td>World-writeable files may be created in additional shares on a Samba
289 <td>4.0.0rc6-4.0.3</td>
290 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
292 <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
298 <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
299 patch for Samba 4.0.1</a><br />
300 <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
301 patch for Samba 3.6.11</a><br />
302 <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
303 patch for Samba 3.5.20</a><br />
304 <td>Clickjacking issue and potential XSRF in SWAT.</td>
306 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>,
307 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
309 <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
310 <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
316 <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
317 patch for Samba 4.0.0</a>
318 <td>Samba 4.0 as an AD DC may provide authenticated users with write
319 access to LDAP directory objects.</td>
321 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
322 <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
327 <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
328 patch for Samba 3.4.16</a><br />
329 <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
330 patch for Samba 3.5.14</a><br />
331 <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
332 patch for Samba 3.6.4</a><br />
333 <td>Incorrect permission checks when granting/removing privileges can
334 compromise file server security.</td>
336 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
337 <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
342 <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
343 patch for Samba 3.0.37</a><br />
344 <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
345 patch for Samba 3.2.15</a><br />
346 <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
347 patch for Samba 3.3.16</a><br />
348 <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
349 patch for Samba 3.4.15</a><br />
350 <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
351 patch for Samba 3.5.13</a><br />
352 <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
353 patch for Samba 3.6.3</a><br />
354 <td>"root" credential remote code execution</td>
355 <td>all current releases</td>
356 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
357 <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
362 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
363 patch for Samba 3.0</a><br />
364 <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
365 patch for Samba 3.2</a><br />
366 <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
367 patch for Samba 3.3</a><br />
368 <td>Remote code execution vulnerability in smbd</td>
370 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
371 <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
376 <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
377 patch for Samba 3.6.2</a>
378 <td>Memory leak/Denial of service</td>
380 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
381 <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
386 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
387 patch for Samba 3.3.15</a><br />
388 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
389 patch for Samba 3.4.13</a><br />
390 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
391 patch for Samba 3.5.9</a><br />
392 <td>Cross-Site Request Forgery in SWAT</td>
393 <td>all current releases</td>
394 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
395 <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
400 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
401 patch for Samba 3.3.15</a><br />
402 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
403 patch for Samba 3.4.13</a><br />
404 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
405 patch for Samba 3.5.9</a><br />
406 <td>Cross-Site Scripting vulnerability in SWAT</td>
407 <td>all current releases</td>
408 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
409 <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
414 <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
415 patch for Samba 3.3.14</a><br />
416 <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
417 patch for Samba 3.4.11</a><br />
418 <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
419 patch for Samba 3.5.6</a><br />
420 <td>Denial of service - memory corruption</td>
421 <td>all current releases</td>
422 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
423 <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
428 <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
429 patch for Samba 3.3.13</a><br />
430 <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
431 patch for Samba 3.4.8</a><br />
432 <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
433 patch for Samba 3.5.4</a><br />
434 <td>Buffer Overrun Vulnerability</td>
435 <td>all current releases</td>
436 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
437 <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
442 <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
443 patch for Samba 3.3.12 and 3.2.15</a><br />
444 <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
445 patch for Samba 3.0.37</a><br />
446 <td>Memory Corruption Vulnerability</td>
447 <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
448 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
449 <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
454 <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
455 patch for Samba 3.5.0</a><br />
456 <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
457 patch for Samba 3.4.6</a><br />
458 <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
459 patch for Samba 3.3.11</a><br />
460 <td>Permission ignored</td>
461 <td>3.3.11, 3.4.6, 3.5.0</td>
462 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
463 <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
468 <td>not available</td>
469 <td>Change parameter "wide links" to default to "no"</td>
471 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
472 <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
477 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
478 patch 1 for Samba 3.4.1</a>
479 <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
480 patch 2 for Samba 3.4.1</a>
481 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
482 patch 1 for Samba 3.3.7</a>
483 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
484 patch 2 for Samba 3.3.7</a>
485 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
486 patch 1 for Samba 3.2.14</a>
487 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
488 patch 2 for Samba 3.2.14</a>
489 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
490 patch 1 for Samba 3.0.36</a>
491 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
492 patch 2 for Samba 3.0.36</a>
493 <td>Information disclosure by setuid mount.cifs</td>
494 <td>all releases</td>
495 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
496 <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
501 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
502 patch for Samba 3.4.1</a><br />
503 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
504 patch for Samba 3.3.7</a><br />
505 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
506 patch for Samba 3.2.14</a><br />
507 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
508 patch for Samba 3.0.36</a><br />
509 <td>Remote DoS against smbd on authenticated connections</td>
510 <td>all releases</td>
511 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
512 <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
518 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
519 patch for Samba 3.4.1</a><br />
520 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
521 patch for Samba 3.3.7</a><br />
522 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
523 patch for Samba 3.2.14</a><br />
524 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
525 patch for Samba 3.0.36</a><br />
526 <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
528 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
529 <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
535 <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
536 patch for Samba 3.3.5</a><br />
537 <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
538 patch for Samba 3.2.12</a><br />
539 <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
540 patch for Samba 3.0.34</a><br />
541 <td>Uninitialized read of a data value</td>
542 <td>Samba 3.0.31 - 3.3.5</td>
543 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
544 <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
550 <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
551 patch for Samba 3.2.12</a>
552 <td>Formatstring vulnerability in smbclient</td>
553 <td>Samba 3.2.0 - 3.2.12</td>
554 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
555 <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
561 <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
562 patch for Samba 3.2.6</a>
563 <td>Potential access to "/" in setups with registry shares enabled</td>
564 <td>Samba 3.2.0 - 3.2.6</td>
565 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
566 <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
570 <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
571 patch for Samba 3.0.32</a>
572 <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
573 patch for Samba 3.2.4</a></td>
574 <td>Potential leak of arbitrary memory contents</td>
575 <td>Samba 3.0.29 - 3.2.4</td>
576 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
577 <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
582 <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
583 patch 1 for Samba 3.2.2</a>
584 <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
585 patch 2 for Samba 3.2.2</a></td>
586 <td>Wrong permissions of group_mapping.ldb</td>
587 <td>Samba 3.2.0 - 3.2.2</td>
588 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
589 <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
594 <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
595 <td>Boundary failure when parsing SMB responses</td>
596 <td>Samba 3.0.0 - 3.0.29</td>
597 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
598 <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
603 <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
604 <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
605 <td>Samba 3.0.0 - 3.0.27a</td>
606 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
607 <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
612 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
613 <td>Remote Code Execution in Samba's nmbd</td>
614 <td>Samba 3.0.0 - 3.0.26a</td>
615 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
616 <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
621 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
622 <td>GETDC mailslot processing buffer overrun in nmbd</td>
623 <td>Samba 3.0.0 - 3.0.26a</td>
624 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
625 <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
630 <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
631 <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
632 <td>Samba 3.0.25 - 3.0.25c</td>
633 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
634 <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
639 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
640 <td>Remote Command Injection Vulnerability (Updated June 5 to include missing "c" character from INCLUDE list).</td>
641 <td>Samba 3.0.0 - 3.0.25rc3</td>
642 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
643 <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
648 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
649 <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
650 <td>Samba 3.0.0 - 3.0.25rc3</td>
651 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
652 <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
657 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
658 <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the "force group" parameter).</td>
659 <td>Samba 3.0.23d - 3.0.25pre2</td>
660 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
661 <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
666 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
667 <td>Potential Denial of Service bug in smbd</td>
668 <td>Samba 3.0.6 - 3.0.23d</td>
669 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
670 <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
675 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
676 <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
677 <td>Samba 3.0.21 - 3.0.23d</td>
678 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
679 <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
684 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
685 <td>Format string bug in afsacl.so VFS plugin</td>
686 <td>Samba 3.0.6 - 3.0.23d</td>
687 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
688 <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
692 <td>10 July 2006</td>
693 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
694 <td>Memory exhaustion DoS against smbd</td>
695 <td>Samba 3.0.1 - 3.0.22</td>
696 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
697 <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
702 <td>30 March 2006</td>
703 <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
704 <td>Exposure of machine account credentials in winbind log files</td>
705 <td>Samba 3.0.21 - 3.0.21c</td>
706 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
707 <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
711 <td>16 December 2004</td>
712 <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
713 <td>Integer Overflow in security descriptor parsing</td>
714 <td>Samba 2.x, 3.0.x <= 3.0.9</td>
715 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
716 <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
721 <td>15 November 2004</td>
722 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
723 <td>Buffer Overrun in smbd</td>
724 <td>Samba 3.0.x <= 3.0.7</td>
725 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
726 <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
730 <td>8 November 2004</td>
731 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
733 <td>Samba 3.0.x <= 3.0.7</td>
734 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
735 <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
739 <td>30 September 2004</td>
740 <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
741 <td>Potential arbitrary file access</td>
742 <td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
743 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
744 <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
749 <td>13 Sept 2004</td>
750 <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
751 <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
752 <td>3.0.x <= 3.0.6</td>
753 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
754 <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
759 <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
760 <td>Two potential buffer overruns</td>
762 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
763 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
765 <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
766 <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
771 <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
772 <td>Buffer overrun in hash mangling method</td>
773 <td>all 2.2 releases</td>
774 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
776 <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
781 <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
782 <td align="left">Password initialization bug that could grant
783 an attacker unauthorized
784 access to a user account created by the mksmbpasswd.sh shell script.</td>
787 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
788 <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
793 <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
794 <td>Buffer overrun condition in the SMB/CIFS packet fragment
795 re-assembly code.</td>
796 <td>all 2.0 releases and <= 2.2.8</td>
797 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
798 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
799 <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
804 <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
805 <td>Bug in the length checking for encrypted password change
806 requests from clients.</td>
807 <td>2.2.2 - 2.2.6</td>
808 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
809 <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
814 <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
815 <td>Bug in expansion of certain smb.conf variables such as
816 %m that could grant an attacker the capability to overwrite arbitrary
817 files on the server. Bug that causes smbd not to honor the hosts allow
818 and deny smb.conf directives.</td>
821 <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
826 <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
827 <td>Bug in the handling of temporary files that allows local
828 users to destroy data on local devices.</td>
831 <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
836 <p><em>If you suspect you have discovered a serious security hole in a
837 Samba release, please send an email to <a
838 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
840 <!--#include virtual="footer_history.html" -->