samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<4.8.4-r0
  • M
NULL Pointer Dereference

<4.8.4-r0
  • H
Out-of-Bounds

<4.8.4-r0
  • M
CVE-2023-42670

<4.18.8-r0
  • H
Race Condition

<4.6.1-r0
  • M
Incorrect Default Permissions

<4.18.8-r0
  • H
Man-in-the-Middle (MitM)

<4.7.0-r0
  • H
Out-of-Bounds

<4.7.3-r0
  • C
Use After Free

<4.7.3-r0
  • H
Integer Overflow or Wraparound

<4.16.7-r0
  • M
Heap-based Buffer Overflow

<4.16.6-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.8.11-r0
  • M
Missing Authorization

<4.18.9-r0
  • M
Use After Free

<4.12.2-r0
  • M
Directory Traversal

<4.8.11-r0
  • M
Out-of-bounds Read

<4.11.5-r0
  • M
Improper Authentication

<4.15.2-r0
  • M
Directory Traversal

<4.11.2-r0
  • M
NULL Pointer Dereference

<4.15.0-r0
  • H
Incorrect Authorization

<4.15.2-r0
  • M
Out-of-bounds Write

<4.18.8-r0
  • M
Information Exposure

<4.8.4-r0
  • M
Use of Insufficiently Random Values

<4.17.0-r0
  • H
Insufficiently Protected Credentials

<4.8.4-r0
  • M
Weak Password Requirements

<4.11.2-r0
  • M
Double Free

<4.8.7-r0
  • M
NULL Pointer Dereference

<4.8.7-r0
  • H
Information Exposure

<4.7.0-r0
  • H
Incorrect Default Permissions

<4.17.0-r0
  • H
Use After Free

<4.15.2-r0
  • H
Improper Input Validation

<4.12.5-r0
  • M
Resource Exhaustion

<4.8.7-r0
  • M
CVE-2023-42669

<4.18.8-r0
  • M
NULL Pointer Dereference

<4.7.6-r0
  • H
Improper Input Validation

<4.15.2-r0
  • H
Cryptographic Issues

<4.7.0-r0
  • H
CVE-2021-23192

<4.15.2-r0
  • H
Incorrect Authorization

<4.7.6-r0
  • H
Out-of-bounds Read

<4.14.2-r0
  • H
Out-of-bounds Read

<4.14.2-r0
  • C
Directory Traversal

<4.18.8-r0
  • M
NULL Pointer Dereference

<4.12.9-r0
  • M
CVE-2022-32742

<4.15.9-r0
  • H
Improper Authentication

<4.15.9-r0
  • M
CVE-2021-3670

<4.15.9-r0
  • M
CVE-2020-14383

<4.12.9-r0
  • H
Authentication Bypass

<4.15.9-r0
  • H
Buffer Overflow

<4.12.2-r0
  • H
Missing Authorization

<4.15.2-r0
  • M
Incorrect Permission Assignment for Critical Resource

<4.18.1-r0
  • M
Use After Free

<4.15.9-r0
  • H
Improper Input Validation

<4.15.2-r0
  • M
Link Following

<4.16.6-r0
  • H
Out-of-bounds Read

<4.15.9-r0
  • H
Race Condition

<4.15.2-r0
  • M
Out-of-bounds Read

<4.14.4-r0
  • M
Improper Privilege Management

<4.12.9-r0
  • M
Use After Free

<4.12.5-r0
  • M
Improper Privilege Management

<4.12.7-r0
  • M
NULL Pointer Dereference

<4.12.5-r0
  • H
Improperly Implemented Security Check for Standard

<4.10.3-r0
  • H
Resource Exhaustion

<4.12.5-r0
  • M
Use After Free

<4.11.5-r0
  • M
CVE-2019-14902

<4.11.5-r0
  • M
NULL Pointer Dereference

<4.10.5-r0
  • M
Incorrect Default Permissions

<4.11.3-r0
  • M
Improper Authentication

<4.11.3-r0
  • C
Directory Traversal

<4.10.8-r0
  • M
NULL Pointer Dereference

<4.10.5-r0