samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://download.samba.org|samba package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Privilege Management

[0,)
  • M
Out-of-bounds Write

[,4.19.2)
  • M
Denial of Service (DoS)

[4.0.0,4.17.12)[4.18.0,4.18.8)[4.19.0,4.19.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[4.16.0,4.17.12)[4.18.0,4.18.8)[4.19.0,4.19.1)
  • H
Information Exposure

[4.0.0,4.17.12)[4.18.0,4.18.8)[4.19.0,4.19.1)
  • M
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

[,4.17.12)[4.18.0,4.18.8)[4.19.0,4.19.1)
  • M
Incorrect Access Control

[,4.17.12)[4.18.0,4.18.8)[4.19.0,4.19.1)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,4.16.11)[4.17.0,4.17.10)[4.18.0,4.18.5)
  • H
Infinite loop

[,4.16.11)[4.17.0,4.17.10)[4.18.0,4.18.5)
  • M
Improper Authentication

[,4.17.10)[4.18.0,4.18.5)
  • M
Information Exposure

[,4.16.11)[4.17.0,4.17.10)[4.18.0,4.18.5)
  • M
Out-of-bounds Read

[,4.16.11)[4.17.0,4.17.10)[4.18.0,4.18.5)
  • M
Information Exposure

[,4.16.10)[4.17.0,4.17.7)[4.18.0,4.18.1)
  • M
Incorrect Permission Assignment for Critical Resource

[,4.17.7)[4.18.0,4.18.1)
  • M
Cleartext Transmission of Sensitive Information

[,4.16.10)[4.17.0,4.17.7)[4.18.0,4.18.1)
  • H
Use of Weak Hash

[,4.15.13)[4.16.0,4.16.8)[4.17.0,4.17.4)
  • H
Improper Privilege Management

[,4.15.13)[4.16.0,4.16.8)[4.17.0,4.17.4)
  • H
Use of Weak Hash

[,4.15.13)
  • H
Use of Weak Hash

[,4.15.13)[4.16.0,4.16.8)[4.17.0,4.17.4)
  • M
Improper Access Control

(4.17.0,4.17.2]
  • M
Heap-based Buffer Overflow

[,4.15.11)[4.16.0,4.16.6)[4.17.0,4.17.2)
  • M
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

[,4.17.0rc1)
  • M
Improper Input Validation

[,4.17.0rc1)
  • M
Information Exposure

[,4.11.0)
  • M
Out-of-bounds Read

[0,)
  • M
Access Restriction Bypass

[0,)
  • M
Information Exposure

[0,)
  • H
Authentication Bypass by Spoofing

[0,)
  • M
Insufficient Verification of Data Authenticity

[3.0.0,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • M
Information Exposure

[3.0.0,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • M
Information Exposure

[,4.15.5)
  • H
Use After Free

[4.13.0,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • H
Authorization Bypass

[4.0.0,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • H
Improper Input Validation

[,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • H
Information Exposure

[,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • H
Improper Input Validation

[,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • H
Incorrect Authorization

[,4.13.14)[4.14.0,4.14.10)[4.15.0,4.15.2)
  • M
Denial of Service (DoS)

[,4.14.13)[4.15.0,4.15.6)
  • C
Out-of-Bounds

[,4.13.17)[4.14.0,4.14.12)[4.15.0,4.15.4)
  • M
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Improper Input Validation

[0,4.0.18)
  • H
Out-of-bounds Read

[4.0.0,4.12.13)[4.13.0,4.13.6)[4.14.0,4.14.1)
  • C
Arbitrary Code Execution

[,0.3.2)[2.2.0,2.2.8)
  • M
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Double Free

[4.3.0,4.7.12)[4.8.0,4.8.7)[4.8.8,4.9.3)
  • M
Access Restriction Bypass

[3.0.0,3.0.35)[3.2.0,3.2.13)[3.3.0,3.3.6)
  • C
Code

[,3.6.25)[4.0.0,4.0.25)[4.1.0,4.1.17)
  • H
Remote Code Execution (RCE)

[,4.0.21)[4.1.0,4.1.11)
  • H
Out-of-Bounds

[3.6.0,4.7.3)
  • M
NULL Pointer Dereference

[4.0.0,4.7.12)[4.8.0,4.8.7)[4.8.8,4.9.3)
  • H
Arbitrary Code Execution

[,2.0.7]
  • M
Directory Traversal

[,4.8.11)[4.9.0,4.9.6)[4.10.0,4.10.2)
  • M
Improper Input Validation

[,3.5.9)
  • M
Arbitrary Code Execution

[,2.0.8)
  • H
Out-of-bounds Read

[4.0.0,4.12.13)[4.13.0,4.13.6)[4.14.0,4.14.1)
  • C
Privilege Escalation

[,4.10.18)[4.11.0,4.11.13)[4.12.0,4.12.7)
  • H
Access Restriction Bypass

[,4.0.24)[4.1.0,4.1.16)
  • H
Cryptographic Issues

[,4.4.16)[4.5.0,4.5.14)[4.6.0,4.6.8)
  • H
Access Restriction Bypass

[,4.1.22)[4.2.0,4.2.7)[4.3.0,4.3.3)
  • M
Insufficiently Protected Credentials

[,3.6.23)[4.0.0,4.0.16)[4.1.0,4.1.6)
  • M
Use After Free

[4.9.0,4.9.18)[4.10.0,4.10.12)[4.11.0,4.11.5)
  • M
Denial of Service (DoS)

[,2.2.11)
  • H
Buffer Overflow

[4.0.0,4.10.15)[4.11.0,4.11.8)[4.12.0,4.12.2)
  • H
CVE-1999-0812

[,2.0.5]
  • M
Improper Input Validation

[,3.5.21)[3.6.0,3.6.12)[4.0.0,4.0.2)
  • M
Denial of Service (DoS)

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Information Exposure

[,4.1.22)[4.2.0,4.2.7)[4.3.0,4.3.3)
  • L
Cross-site Scripting (XSS)

[0,3.5.10)
  • M
Denial of Service (DoS)

[3.0.1,3.0.22]
  • L
Out-of-Bounds

[,3.6.24)[4.0.0,4.0.19)[4.1.0,4.1.9)
  • M
NULL Pointer Dereference

[4.5.0,4.10.17)[4.11.0,4.11.11)[4.12.0,4.12.4)
  • H
Insufficiently Protected Credentials

[,4.7.9)
  • H
Denial of Service (DoS)

[4.0.0,4.10.17)[4.11.0,4.11.11)[4.12.0,4.12.4)
  • M
Security Bypass

[4.9.0,4.9.3)
  • H
Information Exposure

[3.0.0,3.0.1]
  • M
Insecure Permissions

[3.6.0,4.11.15)[4.12.0,4.12.9)[4.13.0,4.13.1)
  • H
Improper Input Validation

[4.10.0,4.10.17)[4.11.0,4.11.11)[4.12.0,4.12.4)
  • H
Out-of-Bounds

[,3.3.13)
  • M
Out-of-bounds Read

[4.9.0,4.9.18)[4.10.0,4.10.12)[4.11.0,4.11.5)
  • M
NULL Pointer Dereference

[,4.5.16)[4.6.0,4.6.14)[4.7.0,4.7.6)
  • M
NULL Pointer Dereference

[4.7.0,4.7.9)[4.8.0,4.8.4)
  • M
Arbitrary Code Execution

[3.0.23d,3.0.23]
  • M
Access Restriction Bypass

[,3.6.20)[4.0.0,4.0.11)[4.1.0,4.1.1)
  • H
Access Restriction Bypass

[3.0.25a,3.0.25]
  • M
Improper Input Validation

[3.2.0,3.2.6]
  • M
Access Restriction Bypass

[,4.3.13)[4.4.0,4.4.8)[4.5.0,4.5.3)
  • C
Denial of Service (DoS)

[2.2.2,2.2.6]
  • C
Arbitrary Code Execution

[,0.3.1)[2.2.0,2.2.8)
  • H
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • H
Access Restriction Bypass

[3.3.11,3.5.0]
  • H
Improper Access Control

[,4.2.14)[4.3.0,4.3.11)[4.4.0,4.4.5)
  • M
Improper Input Validation

[,3.6.24)[4.0.0,4.0.19)[4.1.0,4.1.9)
  • M
Denial of Service (DoS)

[,3.4.8)
  • M
Improper Input Validation

[3.0.23d,4.1.2]
  • M
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
NULL Pointer Dereference

[4.10.0,4.10.5)
  • H
Out-of-Bounds

[3.0.28a,3.0.29]
  • L
Arbitrary Code Execution

[,2.2.8)
  • H
Incorrect Authorization

[4.0.0,)
  • C
Denial of Service (DoS)

[,2.2.8)
  • M
Use After Free

[,4.10.15)[4.11.0,4.11.8)[4.12.0,4.12.2)
  • M
Access Restriction Bypass

[,3.6.6)
  • H
Out-of-Bounds

[,2.2.5)
  • M
Denial of Service (DoS)

[3.0.0,3.0.6]
  • M
Race Condition

[,3.6.0]
  • H
Cross-site Scripting (XSS)

[,3.0.0)
  • M
Denial of Service (DoS)

[0,1.1.24)
  • L
Cryptographic Issues

[,4.0.11)[4.1.0,4.1.1)
  • L
Directory Traversal

[,3.3.11)[3.4.0,3.4.6)
  • M
Access Restriction Bypass

[,3.2.0]
  • H
Use of Externally-Controlled Format String

[3.0.23d,3.0.22]
  • M
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Directory Traversal

[,4.9.15)[4.10.0,4.10.10)[4.11.0,4.11.2)
  • M
Improper Input Validation

[4.3.0,4.3.13)[4.4.0,4.4.8)[4.5.0,4.5.3)
  • M
Denial of Service (DoS)

[3.0.0,3.0.7]
  • M
Out-of-Bounds

[,4.1.23)[4.2.0,4.2.9)[4.3.0,4.3.6)
  • C
Denial of Service (DoS)

[2.0.0,3.0.9]
  • M
Access Restriction Bypass

[4.0.0,4.11.15)[4.12.0,4.12.9)[4.13.0,4.13.1)
  • H
Out-of-Bounds

[,3.6.22)[4.0.0,4.0.13)[4.1.0,4.1.3)
  • M
Improper Authentication

[4.0.0,4.9.17)[4.10.0,4.10.11)[4.11.0,4.11.3)
  • C
Arbitrary Code Execution

[3.0.0,3.0.7]
  • M
Out-of-bounds Read

[3.6.0,4.12.15)[4.13.0,4.13.8)[4.14.0,4.14.4)
  • H
Security Features

[,4.4.16)[4.5.0,4.5.14)[4.6.0,4.6.8)
  • L
Information Exposure

[,4.0.18)[4.1.0,4.1.8)
  • C
Buffer Overflow

[,1.9.18)
  • M
NULL Pointer Dereference

[4.11.0,4.11.15)[4.12.0,4.12.9)[4.13.0,4.13.1)
  • M
Improper Input Validation

[,4.1.22)[4.2.0,4.2.7)[4.3.0,4.3.3)
  • H
Cryptographic Issues

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Cross-site Request Forgery (CSRF)

[0,3.5.10)
  • H
Out-of-Bounds

[,4.6.16)[4.7.0,4.7.9)[4.8.0,4.8.4)
  • H
Information Exposure

[,4.4.16)[4.5.0,4.5.14)[4.6.0,4.6.8)
  • M
Out-of-bounds Read

[,4.10.0)
  • M
Buffer Overflow

[,2.0.4]
  • L
Access Restriction Bypass

[,4.0.1)
  • M
Prototype Pollution

[,1.9.18]
  • M
Insecure Default

[4.0.0,4.9.17)[4.10.0,4.10.11)[4.11.0,4.11.3)
  • H
Resource Management Errors

[,4.1.22)
  • L
Improper Input Validation

[,3.5.11)
  • M
Denial of Service (DoS)

[4.7.0,4.7.12)[4.8.0,4.8.7)[4.9.0,4.9.3)
  • C
Denial of Service (DoS)

[,2.0.5]
  • L
Access Restriction Bypass

[,3.0.37)[3.2.0,3.2.15)[3.3.0,3.3.8)[3.4.0,3.4.2)
  • M
Improper Input Validation

[4.8.0,4.8.4)
  • M
Security Features

[,4.2.10)[4.3.0,4.3.7)[4.4.0,4.4.1)
  • M
Information Exposure

[4.0.0,4.6.16)[4.7.0,4.7.9)[4.8.0,4.8.4)
  • M
Out-of-Bounds

[,3.4.8)
  • C
Remote Code Execution (RCE)

[,4.6.4)
  • M
Buffer Overflow

[3.0.0,3.0.4]
  • M
Information Exposure

[,3.6.3)
  • M
Denial of Service (DoS)

[3.0.0,3.0.6]
  • H
Information Exposure

[,1.1.24)[4.1.0,4.1.22)[4.2.0,4.2.7)[4.3.0,4.3.3)
  • M
Access Restriction Bypass

[0,4.0.4)
  • M
Cryptographic Weakness

[4.5.0,4.9.15)[4.10.0,4.10.10)[4.11.0,4.11.2)
  • M
Access Restriction Bypass

[,3.4.17)[3.5.0,3.5.15)[3.6.0,3.6.5)
  • H
Out-of-Bounds

[3.0.23d,3.0.26]
  • M
Denial of Service (DoS)

[,2.0.7]
  • M
Improper Input Validation

[,3.4.6)
  • H
Out-of-Bounds

[4.0.0,4.5.3)
  • H
Arbitrary Code Execution

[0,)
  • C
Use After Free

[4.0.0,4.7.3)
  • M
Denial of Service (DoS)

[,3.0.6)
  • M
Cross-site Request Forgery (CSRF)

[,3.5.21)[3.6.0,3.6.12)[4.0.0,4.0.2)
  • M
CVE-2000-0938

[,2.0.7]
  • M
Symlink Attack

[3.0.22,3.4.5]
  • M
NULL Pointer Dereference

[4.9.0,4.9.3)
  • M
Remote Code Execution (RCE)

[,3.0.24-r2)
  • M
Information Exposure

[,2.0.7]
  • C
Out-of-Bounds

[,3.0.24-r2)
  • M
Denial of Service (DoS)

[3.0.23d,3.0.23]
  • C
Denial of Service (DoS)

[,3.4.16)
  • M
NULL Pointer Dereference

[4.0.0,4.9.15)[4.10.0,4.10.10)
  • M
Resource Management Errors

[,4.4.10)
  • M
Insecure Default

[4.9.0,4.9.6)[4.10.0,4.10.2)
  • M
Denial of Service (DoS)

[4.0.0,4.7.12)[4.8.0,4.8.7)[4.8.8,4.9.3)
  • M
Out-of-Bounds

[,3.3.15)[3.4.0,3.4.12)[3.5.0,3.5.7)
  • L
Information Exposure

[3.0.21a,3.0.21]
  • H
Information Exposure

[,3.0.2)
  • M
Denial of Service (DoS)

[,3.0.37)[3.2.0,3.2.15)[3.3.0,3.3.8)[3.4.0,3.4.2)
  • H
Race Condition

[,4.4.11)[4.5.0,4.5.7)[4.6.0,4.6.1)
  • H
Use of Externally-Controlled Format String

[3.2.0,3.2.12]
  • H
CVE-2007-2444

[3.0.23d,3.0.25]
  • C
Directory Traversal

[4.9.0,4.9.14)[4.10.0,4.10.9)
  • H
Access Restriction Bypass

[,4.1.22)[4.2.0,4.2.7)[4.3.0,4.3.3)
  • H
CVE-2000-0937

[,2.0.7]
  • M
Use After Free

[4.5.0,4.10.17)[4.11.0,4.11.11)[4.12.0,4.12.4)
  • M
Access Restriction Bypass

[,3.2.15)[3.3.0,3.3.8)[3.4.0,3.4.2)
  • H
Arbitrary Code Execution

[0,2.2.8)
  • M
Denial of Service (DoS)

[,3.5.22)[3.6.0,3.6.17)[4.0.0,4.0.8)
  • M
Access Restriction Bypass

[,4.0.16)[4.1.0,4.1.6)
  • H
Out-of-Bounds

[3.0.23d,3.0.26]
  • H
CVE-2004-0186

[2.0,3.0.0]
  • M
Improper Access Control

[,4.1.23)[4.2.0,4.2.9)[4.3.0,4.3.6)[4.4.04,4.4.0rc4)
  • M
NULL Pointer Dereference

[4.9.0,4.9.9)[4.10.0,4.10.5)
  • M
CVE-2019-14902

[4.9.0,4.9.18)[4.10.0,4.10.12)[4.11.0,4.11.5)
  • H
Information Exposure

[3.0.29,3.2.4]
  • H
Out-of-Bounds

[3.0.23d,3.0.27]
  • H
Out-of-Bounds

[,2.0.0.797)
  • H
Out-of-Bounds

[,3.5.5)
  • C
Arbitrary Code Execution

[3.0.2a,3.0.4]
  • C
Directory Traversal

[,2.2.0)
  • H
Security Bypass

[,4.8.12)[4.9.0,4.9.8)[4.10.0,4.10.3)
  • H
Insufficient Verification of Data Authenticity

[4.0.0,4.4.15)[4.5.0,4.5.12)[4.6.0,4.6.6)