samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • H
Reversible One-Way Hash

*
  • L
Unchecked Return Value

*
  • M
Information Exposure

*
  • L
Race Condition

*
  • M
Race Condition

*
  • H
Improper Input Validation

*
  • M
Improper Authentication

*
  • L
NULL Pointer Dereference

<0:3.6.23-51.el6
  • M
Credentials Management

<0:3.6.9-168.el6_5
  • M
Improper Input Validation

<0:3.6.9-168.el6_5
  • M
Out-of-Bounds

*
  • H
Access Restriction Bypass

<0:3.6.9-167.el6_5
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.6.9-167.el6_5
  • M
Man-in-the-Middle (MitM)

<0:3.6.23-45.el6_9
  • M
Information Exposure

<0:3.6.23-45.el6_9
  • M
Cross-site Request Forgery (CSRF)

<0:3.6.9-164.el6
  • M
Integer Overflow or Wraparound

<0:3.6.9-164.el6
  • M
Improper Input Validation

<0:3.6.9-164.el6
  • H
Arbitrary Code Injection

<0:3.6.23-43.el6_9
  • M
Race Condition

<0:3.6.23-45.el6_9
  • M
Improper Authentication

<0:3.6.23-41.el6
  • M
Access Restriction Bypass

<0:3.6.23-41.el6
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
Authentication Bypass

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
CVE-2015-5370

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • M
Improper Access Control

<0:3.6.23-25.el6_7
  • M
Missing Authorization

<0:3.6.23-24.el6_7
  • M
Insufficient Verification of Data Authenticity

<0:3.6.23-24.el6_7
  • M
Path Equivalence

<0:3.6.23-24.el6_7
  • H
Access Restriction Bypass

<0:3.5.10-116.el6_2
  • C
Improper Handling of Syntactically Invalid Structure

<0:3.5.4-68.el6_0.3
  • M
Cross-site Scripting (XSS)

<0:3.5.6-86.el6_1.4
  • M
Cross-site Request Forgery (CSRF)

<0:3.5.6-86.el6_1.4
  • M
Race Condition

<0:3.5.6-86.el6_1.4
  • M
Improper Input Validation

<0:3.5.6-86.el6_1.4
  • M
Improper Input Validation

<0:3.5.6-86.el6_1.4
  • H
Out-of-Bounds

<0:3.5.4-68.el6_0.2
  • C
Out-of-Bounds

<0:3.6.23-14.el6_6
  • C
Improper Validation of Array Index

<0:3.5.4-68.el6_0.1
  • M
Improper Input Validation

<0:3.6.9-169.el6_5
  • M
Encoding Error

<0:3.6.9-169.el6_5
  • C
Improper Authentication

*
  • M
Improper Null Termination

*
  • M
Incorrect Privilege Assignment

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Read

*