1 <!--#include virtual="/samba/header.html" -->
2 <title>Samba - Security Updates and Information</title>
3 <!--#include virtual="header_history.html" -->
5 <h2>Samba Security Releases</h2>
7 <p>Security releases for Samba are listed below by their release
8 date. The previously affected versions of Samba are listed alongside
9 the appropriate security concern. For complete information, follow the
10 link to full release notes for each release.</p>
13 <table class="security_table">
14 <th colspan="6">Samba Security Releases</th>
16 <td><em>Date Issued</em></td>
17 <td><em>Download</em></td>
18 <td><em>Known Issue(s)</em></td>
19 <td><em>Affected Releases</em></td>
20 <td><em>CVE ID #</em></td>
21 <td><em>Details</em></td>
26 <td><a href="/samba/ftp/patches/security/samba-4.3.2-security-2015-12-16.patch">
27 patch for Samba 4.3.2</a><br />
28 <a href="/samba/ftp/patches/security/samba-4.2.6-security-2015-12-16.patch">
29 patch for Samba 4.2.6</a><br />
30 <a href="/samba/ftp/patches/security/samba-4.1.21-security-2015-12-16.patch">
31 patch for Samba 4.1.21</a><br />
32 <a href="/samba/ftp/patches/security/samba-3.6.25-security-2015-12-16.patch">
33 patch for Samba 3.6.25</a><br />
34 <td>Numerous CVEs. Please see the announcements for details.
36 <td>3.0.0 to 4.3.2</td>
37 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223">CVE-2015-3223</a>,
38 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252">CVE-2015-5252</a>,
39 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296">CVE-2015-5296</a>,
40 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299">CVE-2015-5299</a>,
41 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330">CVE-2015-5330</a>,
42 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540">CVE-2015-7540</a>,
43 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467">CVE-2015-8467</a>
45 <td><a href="/samba/security/CVE-2015-3223.html">Announcement</a>
46 <a href="/samba/security/CVE-2015-5252.html">Announcement</a>
47 <a href="/samba/security/CVE-2015-5296.html">Announcement</a>
48 <a href="/samba/security/CVE-2015-5299.html">Announcement</a>
49 <a href="/samba/security/CVE-2015-5330.html">Announcement</a>
50 <a href="/samba/security/CVE-2015-7540.html">Announcement</a>
51 <a href="/samba/security/CVE-2015-8467.html">Announcement</a>
57 <td><a href="/samba/ftp/patches/security/samba-4.1.16-CVE-2015-0240.patch">
58 patch for Samba 4.1.16</a><br />
59 <a href="/samba/ftp/patches/security/samba-4.0.24-CVE-2015-0240.patch">
60 patch for Samba 4.0.24</a><br />
61 <a href="/samba/ftp/patches/security/samba-3.6.24-CVE-2015-0240.patch">
62 patch for Samba 3.6.24</a><br />
63 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2015-0240.patch">
64 patch for Samba 3.5.22</a><br />
65 <td>Unexpected code execution in smbd.
67 <td>3.5.0 - 4.2.0rc4</td>
68 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240">CVE-2015-0240</a>
70 <td><a href="/samba/security/CVE-2015-0240.html">Announcement</a>
76 <td><a href="/samba/ftp/patches/security/samba-4.1.15-CVE-2014-8143.patch">
77 patch for Samba 4.1.15</a><br />
78 <a href="/samba/ftp/patches/security/samba-4.0.23-CVE-2014-8143.patch">
79 patch for Samba 4.0.23</a><br />
80 <td>Elevation of privilege to Active Directory Domain Controller.
82 <td>4.0.0 - 4.1.15</td>
83 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143">CVE-2014-8143</a>
85 <td><a href="/samba/security/CVE-2014-8143.html">Announcement</a>
91 <td><a href="/samba/ftp/patches/security/samba-4.1.10-CVE-2014-3560.patch">
92 patch for Samba 4.1.10</a><br />
93 <a href="/samba/ftp/patches/security/samba-4.0.20-CVE-2014-3560.patch">
94 patch for Samba 4.0.20</a><br />
95 <td>Remote code execution in nmbd.
97 <td>4.0.0 - 4.1.10</td>
98 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560">CVE-2014-3560</a>
100 <td><a href="/samba/security/CVE-2014-3560.html">Announcement</a>
106 <td><a href="/samba/ftp/patches/security/samba-4.1.8-CVE-2014-0244-CVE-2014-3493.patch">
107 patch for Samba 4.1.8</a><br />
108 <a href="/samba/ftp/patches/security/samba-4.0.18-CVE-2014-0244-CVE-2014-3493.patch">
109 patch for Samba 4.0.18</a><br />
110 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0244-CVE-2014-3493.patch">
111 patch for Samba 3.6.23</a><br />
112 <td>Denial of service - CPU loop, Denial of service - Server crash/memory corruption.
114 <td>please refer to the advisories</td>
115 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244">CVE-2014-0244</a>,
116 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493">CVE-2014-3493</a>
118 <td><a href="/samba/security/CVE-2014-0244.html">Announcement</a>
119 <a href="/samba/security/CVE-2014-3493.html">Announcement</a>
124 <td>03 June 2014</td>
125 <td><a href="/samba/ftp/patches/security/samba-4.0.17-CVE-2014-0178-CVE-2014-0239.patch">
126 patch for Samba 4.0.17</a><br />
127 <a href="/samba/ftp/patches/security/samba-4.1.7-CVE-2014-0178-CVE-2014-0239.patch">
128 patch for Samba 4.1.7</a><br />
129 <a href="/samba/ftp/patches/security/samba-3.6.23-CVE-2014-0178.patch">
130 patch for Samba 3.6.23 (CVE-2014-0178 only)</a><br />
131 <td>Uninitialized memory exposure, Potential DOS in Samba internal DNS server.
133 <td>please refer to the advisories</td>
134 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178">CVE-2014-0178</a>,
135 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239">CVE-2014-0239</a>
137 <td><a href="/samba/security/CVE-2014-0178.html">Announcement</a>
138 <a href="/samba/security/CVE-2014-0239.html">Announcement</a>
144 <td><a href="/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch">
145 patch for Samba 4.1.5</a><br />
146 <a href="/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch">
147 patch for Samba 4.0.15</a><br />
148 <a href="/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch">
149 patch for Samba 3.6.22</a><br />
150 <td>Password lockout not enforced for SAMR password changes, smbcacls can remove a file
151 or directory ACL by mistake.
153 <td>please refer to the advisories</td>
154 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496">CVE-2013-4496</a>,
155 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442">CVE-2013-6442</a>
157 <td><a href="/samba/security/CVE-2013-4496.html">Announcement</a>
158 <a href="/samba/security/CVE-2013-6442.html">Announcement</a>
164 <td><a href="/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch">
165 patch for Samba 4.1.2</a><br />
166 <a href="/samba/ftp/patches/security/samba-4.0.12-CVE-2013-4408-CVE-2012-6150.patch">
167 patch for Samba 4.0.12</a><br />
168 <a href="/samba/ftp/patches/security/samba-3.6.21-CVE-2013-4408-CVE-2012-6150.patch">
169 patch for Samba 3.6.21</a><br />
170 <a href="/samba/ftp/patches/security/samba-3.5.22-CVE-2013-4408.patch">
171 patch for Samba 3.5.22</a><br />
172 <a href="/samba/ftp/patches/security/samba-3.4.17-CVE-2013-4408.patch">
173 patch for Samba 3.4.17</a>
174 <td>DCE-RPC fragment length field is incorrectly checked, pam_winbind
175 login without require_membership_of restrictions.</td>
176 <td>please refer to the advisories</td>
177 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408">CVE-2013-4408</a>,
178 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150">CVE-2012-6150</a>
180 <td><a href="/samba/security/CVE-2013-4408.html">Announcement</a>
181 <a href="/samba/security/CVE-2012-6150.html">Announcement</a>
187 <td><a href="/samba/ftp/patches/security/samba-4.1.0-CVE-2013-4475-CVE-2013-4476.patch">
188 patch for Samba 4.1.0</a><br />
189 <a href="/samba/ftp/patches/security/samba-4.0.10-CVE-2013-4475-CVE-2013-4476.patch">
190 patch for Samba 4.0.10</a><br />
191 <a href="/samba/ftp/patches/security/samba-3.6.19-CVE-2013-4475.patch">
192 patch for Samba 3.6.19</a><br />
193 <td>ACLs are not checked on opening an alternate data stream on a file
194 or directory, Private key in key.pem world readable.</td>
195 <td>3.2.0 - 4.1.0, 4.0.0 - 4.0.10, 4.1.0</td>
196 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475">CVE-2013-4475</a>,
197 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476">CVE-2013-4476</a>
199 <td><a href="/samba/security/CVE-2013-4475.html">Announcement</a>
200 <a href="/samba/security/CVE-2013-4476.html">Announcement</a>
206 <td><a href="/samba/ftp/patches/security/samba-4.0.7-CVE-2013-4124.patch">
207 patch for Samba 4.0.7</a><br />
208 <a href="/samba/ftp/patches/security/samba-3.6.16-CVE-2013-4124.patch">
209 patch for Samba 3.6.16</a><br />
210 <a href="/samba/ftp/patches/security/samba-3.5.21-CVE-2013-4124.patch">
211 patch for Samba 3.5.21</a><br />
212 <td>Denial of service - CPU loop and memory allocation.</td>
215 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124">CVE-2013-4124</a>
217 <td><a href="/samba/security/CVE-2013-4124.html">Announcement</a>
223 <td><a href="/samba/ftp/patches/security/samba-3.6-CVE-2013-0454.patch">
224 patch for Samba 3.6.5</a>
225 <td>A writable configured share might get read only</td>
226 <td>3.6.0 - 3.6.5 (inclusive)</td>
227 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454">CVE-2013-0454</a>
229 <td><a href="/samba/security/CVE-2013-0454.html">Announcement</a>
235 <td><a href="/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch">
236 patch for Samba 4.0.3</a>
237 <td>World-writeable files may be created in additional shares on a Samba
239 <td>4.0.0rc6-4.0.3</td>
240 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863">CVE-2013-1863</a>
242 <td><a href="/samba/security/CVE-2013-1863.html">Announcement</a>
248 <td><a href="/samba/ftp/patches/security/samba-4.0.1-CVE-2013-0213-CVE-2013-0214.patch">
249 patch for Samba 4.0.1</a><br />
250 <a href="/samba/ftp/patches/security/samba-3.6.11-CVE-2013-0213-CVE-2013-0214.patch">
251 patch for Samba 3.6.11</a><br />
252 <a href="/samba/ftp/patches/security/samba-3.5.20-CVE-2013-0213-CVE-2013-0214.patch">
253 patch for Samba 3.5.20</a><br />
254 <td>Clickjacking issue and potential XSRF in SWAT.</td>
256 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213">CVE-2013-0213</a>,
257 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214">CVE-2013-0214</a>
259 <td><a href="/samba/security/CVE-2013-0213.html">Announcement</a>
260 <a href="/samba/security/CVE-2013-0214.html">Announcement</a>
266 <td><a href="/samba/ftp/patches/security/samba-4.0.0-CVE-2013-0172.patch">
267 patch for Samba 4.0.0</a>
268 <td>Samba 4.0 as an AD DC may provide authenticated users with write
269 access to LDAP directory objects.</td>
271 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172">CVE-2013-0172</a></td>
272 <td><a href="/samba/security/CVE-2013-0172.html">Announcement</a></td>
277 <td><a href="/samba/ftp/patches/security/samba-3.4.16-CVE-2012-2111.patch">
278 patch for Samba 3.4.16</a><br />
279 <a href="/samba/ftp/patches/security/samba-3.5.14-CVE-2012-2111.patch">
280 patch for Samba 3.5.14</a><br />
281 <a href="/samba/ftp/patches/security/samba-3.6.4-CVE-2012-2111.patch">
282 patch for Samba 3.6.4</a><br />
283 <td>Incorrect permission checks when granting/removing privileges can
284 compromise file server security.</td>
286 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111">CVE-2012-2111</a></td>
287 <td><a href="/samba/security/CVE-2012-2111.html">Announcement</a></td>
292 <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch">
293 patch for Samba 3.0.37</a><br />
294 <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch">
295 patch for Samba 3.2.15</a><br />
296 <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch">
297 patch for Samba 3.3.16</a><br />
298 <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch">
299 patch for Samba 3.4.15</a><br />
300 <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch">
301 patch for Samba 3.5.13</a><br />
302 <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch">
303 patch for Samba 3.6.3</a><br />
304 <td>"root" credential remote code execution</td>
305 <td>all current releases</td>
306 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td>
307 <td><a href="/samba/security/CVE-2012-1182.html">Announcement</a></td>
312 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch">
313 patch for Samba 3.0</a><br />
314 <a href="/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch">
315 patch for Samba 3.2</a><br />
316 <a href="/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch">
317 patch for Samba 3.3</a><br />
318 <td>Remote code execution vulnerability in smbd</td>
320 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870">CVE-2012-0870</a></td>
321 <td><a href="/samba/security/CVE-2012-0870.html">Announcement</a></td>
326 <td><a href="/samba/ftp/patches/security/samba-3.6.2-CVE-2012-0817.patch">
327 patch for Samba 3.6.2</a>
328 <td>Memory leak/Denial of service</td>
330 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817">CVE-2012-0817</a></td>
331 <td><a href="/samba/security/CVE-2012-0817.html">Announcement</a></td>
336 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2522.patch">
337 patch for Samba 3.3.15</a><br />
338 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2522.patch">
339 patch for Samba 3.4.13</a><br />
340 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2522.patch">
341 patch for Samba 3.5.9</a><br />
342 <td>Cross-Site Request Forgery in SWAT</td>
343 <td>all current releases</td>
344 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522">CVE-2011-2522</a></td>
345 <td><a href="/samba/security/CVE-2011-2522.html">Announcement</a></td>
350 <td><a href="/samba/ftp/patches/security/samba-3.3.15-CVE-2011-2694.patch">
351 patch for Samba 3.3.15</a><br />
352 <a href="/samba/ftp/patches/security/samba-3.4.13-CVE-2011-2694.patch">
353 patch for Samba 3.4.13</a><br />
354 <a href="/samba/ftp/patches/security/samba-3.5.9-CVE-2011-2694.patch">
355 patch for Samba 3.5.9</a><br />
356 <td>Cross-Site Scripting vulnerability in SWAT</td>
357 <td>all current releases</td>
358 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694">CVE-2011-2694</a></td>
359 <td><a href="/samba/security/CVE-2011-2694.html">Announcement</a></td>
364 <td><a href="/samba/ftp/patches/security/samba-3.3.14-CVE-2011-0719.patch">
365 patch for Samba 3.3.14</a><br />
366 <a href="/samba/ftp/patches/security/samba-3.4.11-CVE-2011-0719.patch">
367 patch for Samba 3.4.11</a><br />
368 <a href="/samba/ftp/patches/security/samba-3.5.6-CVE-2011-0719.patch">
369 patch for Samba 3.5.6</a><br />
370 <td>Denial of service - memory corruption</td>
371 <td>all current releases</td>
372 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719">CVE-2011-0719</a></td>
373 <td><a href="/samba/security/CVE-2011-0719.html">Announcement</a></td>
378 <td><a href="/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch">
379 patch for Samba 3.3.13</a><br />
380 <a href="/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch">
381 patch for Samba 3.4.8</a><br />
382 <a href="/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch">
383 patch for Samba 3.5.4</a><br />
384 <td>Buffer Overrun Vulnerability</td>
385 <td>all current releases</td>
386 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069">CVE-2010-3069</a></td>
387 <td><a href="/samba/security/CVE-2010-3069.html">Announcement</a></td>
392 <td><a href="/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch">
393 patch for Samba 3.3.12 and 3.2.15</a><br />
394 <a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch">
395 patch for Samba 3.0.37</a><br />
396 <td>Memory Corruption Vulnerability</td>
397 <td>3.0.x, 3.2.x, 3.3.0-3.3.12</td>
398 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-CVE-2010-2063">CVE-2010-2063</a></td>
399 <td><a href="/samba/security/CVE-2010-2063.html">Announcement</a></td>
404 <td><a href="/samba/ftp/patches/security/samba-3.5.0-CVE-2010-0728.patch">
405 patch for Samba 3.5.0</a><br />
406 <a href="/samba/ftp/patches/security/samba-3.4.6-CVE-2010-0728.patch">
407 patch for Samba 3.4.6</a><br />
408 <a href="/samba/ftp/patches/security/samba-3.3.11-CVE-2010-0728.patch">
409 patch for Samba 3.3.11</a><br />
410 <td>Permission ignored</td>
411 <td>3.3.11, 3.4.6, 3.5.0</td>
412 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728">CVE-2010-0728</a></td>
413 <td><a href="/samba/security/CVE-2010-0728.html">Announcement</a></td>
418 <td>not available</td>
419 <td>Change parameter "wide links" to default to "no"</td>
421 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926">CVE-2010-0926</a></td>
422 <td><a href="/samba/security/CVE-2010-0926.html">Announcement</a></td>
427 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-1.patch">
428 patch 1 for Samba 3.4.1</a>
429 <a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2948-2.patch">
430 patch 2 for Samba 3.4.1</a>
431 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-1.patch">
432 patch 1 for Samba 3.3.7</a>
433 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2948-2.patch">
434 patch 2 for Samba 3.3.7</a>
435 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-1.patch">
436 patch 1 for Samba 3.2.14</a>
437 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2948-2.patch">
438 patch 2 for Samba 3.2.14</a>
439 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-1.patch">
440 patch 1 for Samba 3.0.36</a>
441 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2948-2.patch">
442 patch 2 for Samba 3.0.36</a>
443 <td>Information disclosure by setuid mount.cifs</td>
444 <td>all releases</td>
445 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2948</a></td>
446 <td><a href="/samba/security/CVE-2009-2948.html">Announcement</a></td>
451 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2906.patch">
452 patch for Samba 3.4.1</a><br />
453 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2906.patch">
454 patch for Samba 3.3.7</a><br />
455 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2906.patch">
456 patch for Samba 3.2.14</a><br />
457 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2906.patch">
458 patch for Samba 3.0.36</a><br />
459 <td>Remote DoS against smbd on authenticated connections</td>
460 <td>all releases</td>
461 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906">CVE-2009-2906</a></td>
462 <td><a href="/samba/security/CVE-2009-2906.html">Announcement</a></td>
468 <td><a href="/samba/ftp/patches/security/samba-3.4.1-CVE-2009-2813.patch">
469 patch for Samba 3.4.1</a><br />
470 <a href="/samba/ftp/patches/security/samba-3.3.7-CVE-2009-2813.patch">
471 patch for Samba 3.3.7</a><br />
472 <a href="/samba/ftp/patches/security/samba-3.2.14-CVE-2009-2813.patch">
473 patch for Samba 3.2.14</a><br />
474 <a href="/samba/ftp/patches/security/samba-3.0.36-CVE-2009-2813.patch">
475 patch for Samba 3.0.36</a><br />
476 <td>Misconfigured /etc/passwd file may share folders unexpectedly</td>
478 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813">CVE-2009-2813</a></td>
479 <td><a href="/samba/security/CVE-2009-2813.html">Announcement</a></td>
485 <td><a href="/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch">
486 patch for Samba 3.3.5</a><br />
487 <a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch">
488 patch for Samba 3.2.12</a><br />
489 <a href="/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch">
490 patch for Samba 3.0.34</a><br />
491 <td>Uninitialized read of a data value</td>
492 <td>Samba 3.0.31 - 3.3.5</td>
493 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888">CVE-2009-1888</a></td>
494 <td><a href="/samba/security/CVE-2009-1888.html">Announcement</a></td>
500 <td><a href="/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch">
501 patch for Samba 3.2.12</a>
502 <td>Formatstring vulnerability in smbclient</td>
503 <td>Samba 3.2.0 - 3.2.12</td>
504 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886">CVE-2009-1886</a></td>
505 <td><a href="/samba/security/CVE-2009-1886.html">Announcement</a></td>
511 <td><a href="/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch">
512 patch for Samba 3.2.6</a>
513 <td>Potential access to "/" in setups with registry shares enabled</td>
514 <td>Samba 3.2.0 - 3.2.6</td>
515 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022">CVE-2009-0022</a></td>
516 <td><a href="/samba/security/CVE-2009-0022.html">Announcement</a></td>
520 <td><a href="/samba/ftp/patches/security/samba-3.0.32-CVE-2008-4314.patch">
521 patch for Samba 3.0.32</a>
522 <a href="/samba/ftp/patches/security/samba-3.2.4-CVE-2008-4314.patch">
523 patch for Samba 3.2.4</a></td>
524 <td>Potential leak of arbitrary memory contents</td>
525 <td>Samba 3.0.29 - 3.2.4</td>
526 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</a></td>
527 <td><a href="/samba/security/CVE-2008-4314.html">Announcement</a></td>
532 <td><a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-1.patch">
533 patch 1 for Samba 3.2.2</a>
534 <a href="/samba/ftp/patches/security/samba-3.2.2-CVE-2008-3789-2.patch">
535 patch 2 for Samba 3.2.2</a></td>
536 <td>Wrong permissions of group_mapping.ldb</td>
537 <td>Samba 3.2.0 - 3.2.2</td>
538 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3789">CVE-2008-3789</a></td>
539 <td><a href="/samba/security/CVE-2008-3789.html">Announcement</a></td>
544 <td><a href="/samba/ftp/patches/security/samba-3.0.29-CVE-2008-1105.patch">patch for Samba 3.0.29</a></td>
545 <td>Boundary failure when parsing SMB responses</td>
546 <td>Samba 3.0.0 - 3.0.29</td>
547 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</a></td>
548 <td><a href="/samba/security/CVE-2008-1105.html">Announcement</a></td>
553 <td><a href="/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch">patch for Samba 3.0.27a</a></td>
554 <td>Remote Code Execution in Samba's nmbd (send_mailslot())</td>
555 <td>Samba 3.0.0 - 3.0.27a</td>
556 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</a></td>
557 <td><a href="/samba/security/CVE-2007-6015.html">Announcement</a></td>
562 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch">patch for Samba 3.0.26a</a></td>
563 <td>Remote Code Execution in Samba's nmbd</td>
564 <td>Samba 3.0.0 - 3.0.26a</td>
565 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</a></td>
566 <td><a href="/samba/security/CVE-2007-5398.html">Announcement</a></td>
571 <td><a href="/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-4572.patch">patch for Samba 3.0.26a</a></td>
572 <td>GETDC mailslot processing buffer overrun in nmbd</td>
573 <td>Samba 3.0.0 - 3.0.26a</td>
574 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</a></td>
575 <td><a href="/samba/security/CVE-2007-4572.html">Announcement</a></td>
580 <td><a href="/samba/ftp/patches/security/samba-3.0.25-CVE-2007-4138.patch">patch for Samba 3.0.25</a></td>
581 <td>Incorrect primary group assignment for users using the rfc2307 or sfu nss info plugin.</td>
582 <td>Samba 3.0.25 - 3.0.25c</td>
583 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138">CVE-2007-4138</a></td>
584 <td><a href="/samba/security/CVE-2007-4138.html">Announcement</a></td>
589 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2447_v2.patch">patch for Samba 3.0.24</a></td>
590 <td>Remote Command Injection Vulnerability (Updated June 5 to include missing "c" character from INCLUDE list).</td>
591 <td>Samba 3.0.0 - 3.0.25rc3</td>
592 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</a></td>
593 <td><a href="/samba/security/CVE-2007-2447.html">Announcement</a></td>
598 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2446_v2.patch">patch for Samba 3.0.24</a></td>
599 <td>Multiple Heap Overflows Allow Remote Code Execution (Updated May 25 to fix regression in Samba domain controller logon code).</td>
600 <td>Samba 3.0.0 - 3.0.25rc3</td>
601 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</a></td>
602 <td><a href="/samba/security/CVE-2007-2446.html">Announcement</a></td>
607 <td><a href="/samba/ftp/patches/security/samba-3.0.24-CVE-2007-2444_v2.patch">patch for Samba 3.0.24</a></td>
608 <td>Local SID/Name translation bug can result in user privilege elevation (Updated May 25 to fix regression in the "force group" parameter).</td>
609 <td>Samba 3.0.23d - 3.0.25pre2</td>
610 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</a></td>
611 <td><a href="/samba/security/CVE-2007-2444.html">Announcement</a></td>
616 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0452.patch">patch for Samba 3.0.23d</a></td>
617 <td>Potential Denial of Service bug in smbd</td>
618 <td>Samba 3.0.6 - 3.0.23d</td>
619 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452">CVE-2007-0452</a></td>
620 <td><a href="/samba/security/CVE-2007-0452.html">Announcement</a></td>
625 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0453.patch">patch for Samba 3.0.23d</a></td>
626 <td>Buffer overrun in NSS host lookup Winbind library on Solaris</td>
627 <td>Samba 3.0.21 - 3.0.23d</td>
628 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453">CVE-2007-0453</a></td>
629 <td><a href="/samba/security/CVE-2007-0453.html">Announcement</a></td>
634 <td><a href="/samba/ftp/patches/security/samba-3.0.23d-CVE-2007-0454.patch">patch for Samba 3.0.23d</a></td>
635 <td>Format string bug in afsacl.so VFS plugin</td>
636 <td>Samba 3.0.6 - 3.0.23d</td>
637 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454">CVE-2007-0454</a></td>
638 <td><a href="/samba/security/CVE-2007-0454.html">Announcement</a></td>
642 <td>10 July 2006</td>
643 <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
644 <td>Memory exhaustion DoS against smbd</td>
645 <td>Samba 3.0.1 - 3.0.22</td>
646 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
647 <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
652 <td>30 March 2006</td>
653 <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
654 <td>Exposure of machine account credentials in winbind log files</td>
655 <td>Samba 3.0.21 - 3.0.21c</td>
656 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
657 <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
661 <td>16 December 2004</td>
662 <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
663 <td>Integer Overflow in security descriptor parsing</td>
664 <td>Samba 2.x, 3.0.x <= 3.0.9</td>
665 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
666 <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
671 <td>15 November 2004</td>
672 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
673 <td>Buffer Overrun in smbd</td>
674 <td>Samba 3.0.x <= 3.0.7</td>
675 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
676 <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
680 <td>8 November 2004</td>
681 <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
683 <td>Samba 3.0.x <= 3.0.7</td>
684 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
685 <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
689 <td>30 September 2004</td>
690 <td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
691 <td>Potential arbitrary file access</td>
692 <td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
693 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
694 <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
699 <td>13 Sept 2004</td>
700 <td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
701 <td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
702 <td>3.0.x <= 3.0.6</td>
703 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
704 <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
709 <td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
710 <td>Two potential buffer overruns</td>
712 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
713 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
715 <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
716 <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
721 <td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
722 <td>Buffer overrun in hash mangling method</td>
723 <td>all 2.2 releases</td>
724 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
726 <td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
731 <td><a href="/samba/ftp/old-versions/samba-3.0.2a.tar.gz">3.0.2a</a></td>
732 <td align="left">Password initialization bug that could grant
733 an attacker unauthorized
734 access to a user account created by the mksmbpasswd.sh shell script.</td>
737 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
738 <td><a href="/samba/security/CVE-2004-0082.html">Announcement</a></td>
743 <td><a href="/samba/ftp/old-versions/samba-2.2.8a.tar.gz">2.2.8a</a></td>
744 <td>Buffer overrun condition in the SMB/CIFS packet fragment
745 re-assembly code.</td>
746 <td>all 2.0 releases and <= 2.2.8</td>
747 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
748 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
749 <td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
754 <td><a href="/samba/ftp/old-versions/samba-2.2.7a.tar.gz">2.2.7a</a></td>
755 <td>Bug in the length checking for encrypted password change
756 requests from clients.</td>
757 <td>2.2.2 - 2.2.6</td>
758 <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
759 <td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
764 <td><a href="/samba/ftp/old-versions/samba-2.2.0a.tar.gz">2.2.0a</a></td>
765 <td>Bug in expansion of certain smb.conf variables such as
766 %m that could grant an attacker the capability to overwrite arbitrary
767 files on the server. Bug that causes smbd not to honor the hosts allow
768 and deny smb.conf directives.</td>
771 <td><a href="/samba/history/samba-2.2.0a.html">release notes</a></td>
776 <td><a href="/samba/ftp/old-versions/samba-2.0.10.tar.gz">2.0.10</a></td>
777 <td>Bug in the handling of temporary files that allows local
778 users to destroy data on local devices.</td>
781 <td><a href="/samba/history/samba-2.0.10.html">release notes</a></td>
786 <p><em>If you suspect you have discovered a serious security hole in a
787 Samba release, please send an email to <a
788 href="mailto:security@samba.org">security@samba.org</a>.</em></p>
790 <!--#include virtual="footer_history.html" -->