CVE-2014-0178 Affecting samba package, versions <2:4.1.8+dfsg-1


Severity

Recommended
0.0
low
0
10

Based on Debian security rating.

Threat Intelligence

EPSS
0.58% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-SAMBA-517806
  • published28 May 2014
  • disclosed28 May 2014

Introduced: 28 May 2014

CVE-2014-0178  (opens in a new tab)

How to fix?

Upgrade Debian:11 samba to version 2:4.1.8+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream samba package and not the samba package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.

CVSS Scores

version 3.1