<tr>
<td>10 July 2006</td>
- <td><a href="/samba/ftp/patches/security/samba-3.0-CAN-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
+ <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2006-3403.patch">patch for Samba 3.0.1 - 3.0.22</a></td>
<td>Memory exhaustion DoS against smbd</td>
<td>Samba 3.0.1 - 3.0.22</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-3403">CVE-2006-3403</a></td>
- <td><a href="/samba/security/CAN-2006-3403.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</a></td>
+ <td><a href="/samba/security/CVE-2006-3403.html">Announcement</a></td>
</tr>
<tr>
<tr>
<td>30 March 2006</td>
- <td><a href="/samba/ftp/patches/security/samba-3.0.21-CAN-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
+ <td><a href="/samba/ftp/patches/security/samba-3.0.21-CVE-2006-1059.patch">patch for Samba 3.0.21[a-c]</a></td>
<td>Exposure of machine account credentials in winbind log files</td>
<td>Samba 3.0.21 - 3.0.21c</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1059">CVE-2006-1059</a></td>
- <td><a href="/samba/security/CAN-2006-1059.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059">CVE-2006-1059</a></td>
+ <td><a href="/samba/security/CVE-2006-1059.html">Announcement</a></td>
</tr>
<tr>
<td>16 December 2004</td>
- <td><a href="/samba/ftp/patches/security/samba-3.0.9-CAN-2004-1154.patch">patch for Samba 3.0.9</a></td>
+ <td><a href="/samba/ftp/patches/security/samba-3.0.9-CVE-2004-1154.patch">patch for Samba 3.0.9</a></td>
<td>Integer Overflow in security descriptor parsing</td>
<td>Samba 2.x, 3.0.x <= 3.0.9</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154">CVE-2004-1154</a></td>
- <td><a href="/samba/security/CAN-2004-1154.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154">CVE-2004-1154</a></td>
+ <td><a href="/samba/security/CVE-2004-1154.html">Announcement</a></td>
</tr>
<tr>
<tr>
<td>15 November 2004</td>
- <td><a href="/samba/ftp/patches/security/samba-3.0.7-CAN-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
+ <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0882.patch">patch for <=Samba 3.0.7</a></td>
<td>Buffer Overrun in smbd</td>
<td>Samba 3.0.x <= 3.0.7</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882">CVE-2004-0882</a></td>
- <td><a href="/samba/security/CAN-2004-0882.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882">CVE-2004-0882</a></td>
+ <td><a href="/samba/security/CVE-2004-0882.html">Announcement</a></td>
</tr>
<tr>
<td>8 November 2004</td>
- <td><a href="/samba/ftp/patches/security/samba-3.0.7-CAN-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
+ <td><a href="/samba/ftp/patches/security/samba-3.0.7-CVE-2004-0930.patch">patch for <=Samba 3.0.7</a></td>
<td>Remote DoS</td>
<td>Samba 3.0.x <= 3.0.7</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930">CVE-2004-0930</a></td>
- <td><a href="/samba/security/CAN-2004-0930.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930">CVE-2004-0930</a></td>
+ <td><a href="/samba/security/CVE-2004-0930.html">Announcement</a></td>
</tr>
<tr>
<td><a href="/samba/ftp/stable/samba-2.2.12.tar.gz">Samba 2.2.12</a> and/or <a href="/samba/ftp/patches/security/samba-3.0.2a-reduce_name.patch">patch for <=Samba 3.0.2a</a></td>
<td>Potential arbitrary file access</td>
<td>Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.2a</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815">CVE-2004-0815</a></td>
- <td><a href="/samba/security/CAN-2004-0815.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815">CVE-2004-0815</a></td>
+ <td><a href="/samba/security/CVE-2004-0815.html">Announcement</a></td>
</tr>
<td><a href="/samba/ftp/patches/security/samba-3.0.5-DoS.patch">3.0.5 patch</a></td>
<td>Two DoS bugs; one affecting smbd, the other nmbd.</td>
<td>3.0.x <= 3.0.6</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CAN-2004-0808</a></td>
- <td><a href="/samba/security/CAN-2004-0807_CAN-2004-0808.html">Announcement</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0807">CVE-2004-0807</a>, <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0808">CVE-2004-0808</a></td>
+ <td><a href="/samba/security/CVE-2004-0807_CVE-2004-0808.html">Announcement</a></td>
</tr>
<tr>
<td><a href="/samba/ftp/stable/samba-3.0.5.tar.gz">3.0.5</a></td>
<td>Two potential buffer overruns</td>
<td>>=3.0.2</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600">CVE-2004-0600</a>,
- <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CVE-2004-0686</a>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600">CVE-2004-0600</a>,
+ <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
</td>
- <td><a href="/samba/security/CAN-2004-0600.html">CVE-2004-0600 Announcement</a>
- <a href="/samba/security/CAN-2004-0686.html">CVE-2004-0686 Announcement</a></td>
+ <td><a href="/samba/security/CVE-2004-0600.html">CVE-2004-0600 Announcement</a>
+ <a href="/samba/security/CVE-2004-0686.html">CVE-2004-0686 Announcement</a></td>
</tr>
<tr>
<td><a href="/samba/ftp/stable/samba-2.2.10.tar.gz">2.2.10</a></td>
<td>Buffer overrun in hash mangling method</td>
<td>all 2.2 releases</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CVE-2004-0686</a>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686">CVE-2004-0686</a>
</td>
<td><a href="/samba/history/samba-2.2.10.html">release notes</a></td>
</tr>
access to a user account created by the mksmbpasswd.sh shell script.</td>
<td>>=3.0.0</td>
<td><a
- href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0082">CVE-2004-0082</a></td>
- <td><a href="/samba/security/CAN-2004-0082.html">Annoucement</a></td>
+ href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0082">CVE-2004-0082</a></td>
+ <td><a href="/samba/security/CVE-2004-0082.html">Annoucement</a></td>
</tr>
<tr>
<td>Buffer overrun condition in the SMB/CIFS packet fragment
re-assembly code.</td>
<td>all 2.0 releases and <= 2.2.8</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0196">CVE-2003-0196</a>,
- <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0201">CVE-2003-0201</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0196">CVE-2003-0196</a>,
+ <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201">CVE-2003-0201</a></td>
<td><a href="/samba/history/samba-2.2.8a.html">release notes</a></td>
</tr>
<td>Bug in the length checking for encrypted password change
requests from clients.</td>
<td>2.2.2 - 2.2.6</td>
- <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0085">CVE-2003-0085</a></td>
+ <td><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085">CVE-2003-0085</a></td>
<td><a href="/samba/history/samba-2.2.7a.html">release notes</a></td>
</tr>