cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-4154,https://securityvulnerability.io/vulnerability/CVE-2023-4154,Samba: ad dc password exposure to privileged users and rodcs,"A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.",Red Hat,"samba,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Storage 3,Fedora",6.5,MEDIUM,0.001230000052601099,false,,false,false,false,,,false,false,,2023-11-07T20:15:00.000Z,0 CVE-2020-10704,https://securityvulnerability.io/vulnerability/CVE-2020-10704,Denial of Service Vulnerability in Samba Active Directory Domain Controller,"A flaw in Samba's implementation as an Active Directory Domain Controller can enable unauthorized users to craft specific requests that trigger a stack overflow, resulting in a denial of service. This affects system availability significantly as it renders the LDAP server unresponsive. This vulnerability impacts all versions of Samba prior to 4.10.15, 4.11.8, and 4.12.2, making timely updates essential.",Red Hat,Samba,7.5,HIGH,0.03167999908328056,false,,false,false,false,,,false,false,,2020-05-06T00:00:00.000Z,0 CVE-2020-10700,https://securityvulnerability.io/vulnerability/CVE-2020-10700,Use-After-Free Vulnerability in Samba AD DC LDAP Servers,"A use-after-free flaw exists in the handling of 'Paged Results' control when combined with the 'ASQ' control in Samba AD DC LDAP servers. This issue could allow a malicious user within a Samba Active Directory to exploit this vulnerability, potentially leading to a denial of service. It is crucial for users and administrators to ensure that their Samba installations are updated to versions 4.10.15, 4.11.8, or 4.12.2 or later to mitigate such risks.",Red Hat,Samba,5.3,MEDIUM,0.004019999876618385,false,,false,false,false,,,false,false,,2020-05-04T20:03:50.000Z,0 CVE-2019-19344,https://securityvulnerability.io/vulnerability/CVE-2019-19344,Use-after-free Vulnerability in Samba Software by Samba Team,"A use-after-free vulnerability exists in all versions of Samba 4.9.x prior to 4.9.18, 4.10.x prior to 4.10.12, and 4.11.x prior to 4.11.5. This flaw arises from a problematic call to realloc(), which may allow an attacker to exploit the original buffer while other local variables still point to it, potentially leading to unexpected behavior or remote code execution.",Red Hat,Samba,6.5,MEDIUM,0.003980000037699938,false,,false,false,false,,,false,false,,2020-01-21T00:00:00.000Z,0 CVE-2019-14907,https://securityvulnerability.io/vulnerability/CVE-2019-14907,Denial of Service Vulnerability in Samba AD DC and File Server,"In certain versions of Samba, if the log level is set to 3 or higher, an issue arises that allows a failure in character conversion to lead to unintended string outputs. This can occur during NTLMSSP authentication exchanges, resulting in the potential termination of long-lived processes such as the RPC server within the Samba Active Directory Domain Controller. Although this may mainly affect an isolated smbd service in a file server context, the implication is that it can disrupt ongoing operations, and therefore, timely patching is advised.",Red Hat,Samba,6.5,MEDIUM,0.008259999565780163,false,,false,false,false,,,false,false,,2020-01-21T00:00:00.000Z,0 CVE-2019-14861,https://securityvulnerability.io/vulnerability/CVE-2019-14861,DNS Manipulation Vulnerability in Samba Products by Samba,"Samba versions prior to specific updates have a vulnerability in the DNS server RPC pipe, allowing authenticated users to create DNS records with default permissions. This can lead to situations where a DNS entry matches the zone name, causing confusion in memory handling routines. The affected versions can mistakenly access invalid memory, which might lead to information exposure and potential unauthorized access to sensitive data.",Red Hat,Samba,5.3,MEDIUM,0.017249999567866325,false,,false,false,false,,,false,false,,2019-12-10T22:19:05.000Z,0 CVE-2019-14870,https://securityvulnerability.io/vulnerability/CVE-2019-14870,Samba Kerberos Delegation Vulnerability in 4.x.x Versions,"Samba versions prior to 4.9.17, 4.10.11, and 4.11.3 exhibit a flaw in the S4U Kerberos delegation model, whereby certain clients can be bypassed from constrained delegation protections. Specifically, even if a client is flagged as non-delegatable in Active Directory through the 'delegation_not_allowed' attribute, Samba inadvertently allows the impersonation of these clients with forwardable tickets. This oversight could lead to unauthorized access to services by compromised accounts, making it crucial for administrators to update to the patched versions promptly to maintain network integrity.",Red Hat,Samba,5.4,MEDIUM,0.0033499998971819878,false,,false,false,false,,,false,false,,2019-12-10T00:00:00.000Z,0