Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4408 (GCVE-0-2013-4408)
Vulnerability from cvelistv5 – Published: 2013-12-10 02:00 – Updated: 2024-08-06 16:45- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:45:13.383Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "HPSBUX03087",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"name": "USN-2054-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2054-1"
},
{
"name": "RHSA-2013:1805",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"name": "FEDORA-2014-9132",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"name": "SSRT101413",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"name": "DSA-2812",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"name": "SUSE-SU-2014:0024",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"name": "openSUSE-SU-2014:0405",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"name": "GLSA-201502-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"name": "FEDORA-2014-7672",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"name": "openSUSE-SU-2013:1921",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"name": "openSUSE-SU-2016:1106",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"name": "RHSA-2013:1806",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"name": "openSUSE-SU-2016:1107",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"name": "64191",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/64191"
},
{
"name": "RHSA-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"name": "MDVSA-2013:299",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-12-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-01-05T14:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "HPSBUX03087",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"name": "USN-2054-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2054-1"
},
{
"name": "RHSA-2013:1805",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"name": "FEDORA-2014-9132",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"name": "SSRT101413",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"name": "DSA-2812",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"name": "SUSE-SU-2014:0024",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"name": "openSUSE-SU-2014:0405",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"name": "GLSA-201502-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"name": "FEDORA-2014-7672",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"name": "openSUSE-SU-2013:1921",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"name": "openSUSE-SU-2016:1106",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"name": "RHSA-2013:1806",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"name": "openSUSE-SU-2016:1107",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"name": "64191",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/64191"
},
{
"name": "RHSA-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"name": "MDVSA-2013:299",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4408",
"datePublished": "2013-12-10T02:00:00.000Z",
"dateReserved": "2013-06-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T16:45:13.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2013-4408
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-4408",
"description": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.",
"id": "GSD-2013-4408",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4408.html",
"https://www.debian.org/security/2013/dsa-2812",
"https://access.redhat.com/errata/RHSA-2014:0009",
"https://access.redhat.com/errata/RHSA-2013:1806",
"https://access.redhat.com/errata/RHSA-2013:1805",
"https://advisories.mageia.org/CVE-2013-4408.html",
"https://linux.oracle.com/cve/CVE-2013-4408.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-4408"
],
"details": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.",
"id": "GSD-2013-4408",
"modified": "2023-12-13T01:22:16.609837Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"name": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"name": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"name": "http://security.gentoo.org/glsa/glsa-201502-15.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
},
{
"name": "http://www.ubuntu.com/usn/USN-2054-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-2054-1"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1805.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-1806.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2014-0009.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"name": "http://www.debian.org/security/2013/dsa-2812",
"refsource": "MISC",
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"name": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch",
"refsource": "MISC",
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"name": "http://www.samba.org/samba/security/CVE-2013-4408",
"refsource": "MISC",
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"name": "http://www.securityfocus.com/bid/64191",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/64191"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4408"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.samba.org/samba/security/CVE-2013-4408",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"name": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"name": "RHSA-2013:1805",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"name": "RHSA-2013:1806",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"name": "DSA-2812",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"name": "openSUSE-SU-2013:1921",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"name": "USN-2054-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-2054-1"
},
{
"name": "SUSE-SU-2014:0024",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"name": "RHSA-2014:0009",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"name": "openSUSE-SU-2014:0405",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"name": "MDVSA-2013:299",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
},
{
"name": "64191",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/64191"
},
{
"name": "GLSA-201502-15",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"name": "SSRT101413",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"name": "openSUSE-SU-2016:1106",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"name": "openSUSE-SU-2016:1107",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"name": "FEDORA-2014-7672",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"name": "FEDORA-2014-9132",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T04:46Z",
"publishedDate": "2013-12-10T06:14Z"
}
}
}
CERTFR-2014-AVI-112
Vulnerability from certfr_avis - Published: 2014-03-10 - Updated: 2014-03-10
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-5718",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5718"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2013-4123",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4123"
},
{
"name": "CVE-2013-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5745"
},
{
"name": "CVE-2013-4231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4231"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4164",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4164"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2014-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0397"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2013-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1418"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2012-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6150"
},
{
"name": "CVE-2013-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5717"
},
{
"name": "CVE-2013-6340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6340"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2013-6337",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6337"
},
{
"name": "CVE-2013-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0900"
},
{
"name": "CVE-2013-6339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6339"
},
{
"name": "CVE-2013-4363",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4363"
},
{
"name": "CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2008-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0386"
},
{
"name": "CVE-2012-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4504"
},
{
"name": "CVE-2012-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2893"
},
{
"name": "CVE-2012-4505",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4505"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2013-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4287"
},
{
"name": "CVE-2009-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0179"
},
{
"name": "CVE-2013-6338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6338"
},
{
"name": "CVE-2013-6336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6336"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4124",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4124"
},
{
"name": "CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"name": "CVE-2013-2561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2561"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2013-5719",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5719"
},
{
"name": "CVE-2013-7114",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7114"
},
{
"name": "CVE-2013-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1417"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2013-5722",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5722"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2013-5720",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5720"
},
{
"name": "CVE-2012-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2825"
},
{
"name": "CVE-2013-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4475"
}
],
"initial_release_date": "2014-03-10T00:00:00",
"last_revision_date": "2014-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nune ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 25 f\u00e9vrier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTFR-2014-AVI-059
Vulnerability from certfr_avis - Published: 2014-02-11 - Updated: 2014-02-11
De multiples vulnérabilités ont été corrigées dans les produits Avaya. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| AVAYA | N/A | Avaya IP Office Server Edition branches 8.x et 9.x | ||
| AVAYA | N/A | Avaya Meeting Exchange branches 5.x et 6.x | ||
| AVAYA | N/A | Avaya Aura Experience Portal branches 6.x et 7.x | ||
| AVAYA | N/A | Avaya IP Office Application Server branches 8.x et 9.x | ||
| AVAYA | N/A | Avaya CMS branche R17.x | ||
| AVAYA | N/A | Avaya Message Networking branche 6.x | ||
| AVAYA | N/A | Avaya Voice Portal branche 5.x | ||
| AVAYA | N/A | Avaya Aura System Manager de la version 5.2 à la version 6.2.3 | ||
| AVAYA | N/A | Avaya one-X Client Enablement Services branche 6.x |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Avaya IP Office Server Edition branches 8.x et 9.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya Meeting Exchange branches 5.x et 6.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya Aura Experience Portal branches 6.x et 7.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya IP Office Application Server branches 8.x et 9.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya CMS branche R17.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya Message Networking branche 6.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya Voice Portal branche 5.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya Aura System Manager de la version 5.2 \u00e0 la version 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
},
{
"description": "Avaya one-X Client Enablement Services branche 6.x",
"product": {
"name": "N/A",
"vendor": {
"name": "AVAYA",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2013-4475",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4475"
}
],
"initial_release_date": "2014-02-11T00:00:00",
"last_revision_date": "2014-02-11T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-059",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-02-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eAvaya\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Avaya",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2014-029 du 20 janvier 2014",
"url": "https://downloads.avaya.com/css/P8/documents/100177852"
}
]
}
CERTA-2013-AVI-658
Vulnerability from certfr_avis - Published: 2013-12-09 - Updated: 2013-12-09
De multiples vulnérabilités ont été corrigées dans Samba. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Samba versions ant\u00e9rieures \u00e0 4.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Samba",
"scada": false
}
}
},
{
"description": "Samba versions ant\u00e9rieures \u00e0 3.5.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Samba",
"scada": false
}
}
},
{
"description": "Samba versions ant\u00e9rieures \u00e0 3.4.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Samba",
"scada": false
}
}
},
{
"description": "Samba versions ant\u00e9rieures \u00e0 4.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Samba",
"scada": false
}
}
},
{
"description": "Samba versions ant\u00e9rieures \u00e0 3.6.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Samba",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4408"
},
{
"name": "CVE-2012-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6150"
}
],
"initial_release_date": "2013-12-09T00:00:00",
"last_revision_date": "2013-12-09T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Samba CVE-2013-4408 du 09 d\u00e9cembre 2013",
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Samba CVE-2012-6150 du 09 d\u00e9cembre 2013",
"url": "http://www.samba.org/samba/security/CVE-2012-6150"
}
],
"reference": "CERTA-2013-AVI-658",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSamba\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Samba",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Samba CVE-2013-4408 du 09 d\u00e9cembre 2013",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Samba CVE-2012-6150 du 09 d\u00e9cembre 2013",
"url": null
}
]
}
FKIE_CVE-2013-4408
Vulnerability from fkie_nvd - Published: 2013-12-10 06:14 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=141660010015249&w=2 | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-1805.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-1806.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0009.html | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201502-15.xml | ||
| secalert@redhat.com | http://www.debian.org/security/2013/dsa-2812 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2013:299 | ||
| secalert@redhat.com | http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch | ||
| secalert@redhat.com | http://www.samba.org/samba/security/CVE-2013-4408 | Vendor Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/64191 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-2054-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141660010015249&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1805.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1806.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0009.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201502-15.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2812 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2013:299 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.samba.org/samba/security/CVE-2013-4408 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/64191 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2054-1 |
| Vendor | Product | Version | |
|---|---|---|---|
| samba | samba | 4.1.0 | |
| samba | samba | 4.1.1 | |
| samba | samba | 4.1.2 | |
| samba | samba | 4.0.0 | |
| samba | samba | 4.0.1 | |
| samba | samba | 4.0.2 | |
| samba | samba | 4.0.3 | |
| samba | samba | 4.0.4 | |
| samba | samba | 4.0.5 | |
| samba | samba | 4.0.6 | |
| samba | samba | 4.0.7 | |
| samba | samba | 4.0.8 | |
| samba | samba | 4.0.9 | |
| samba | samba | 4.0.10 | |
| samba | samba | 4.0.11 | |
| samba | samba | 4.0.12 | |
| samba | samba | 3.0.0 | |
| samba | samba | 3.0.1 | |
| samba | samba | 3.0.2 | |
| samba | samba | 3.0.2 | |
| samba | samba | 3.0.2a | |
| samba | samba | 3.0.3 | |
| samba | samba | 3.0.4 | |
| samba | samba | 3.0.4 | |
| samba | samba | 3.0.5 | |
| samba | samba | 3.0.6 | |
| samba | samba | 3.0.7 | |
| samba | samba | 3.0.8 | |
| samba | samba | 3.0.9 | |
| samba | samba | 3.0.10 | |
| samba | samba | 3.0.11 | |
| samba | samba | 3.0.12 | |
| samba | samba | 3.0.13 | |
| samba | samba | 3.0.14 | |
| samba | samba | 3.0.14 | |
| samba | samba | 3.0.14a | |
| samba | samba | 3.0.15 | |
| samba | samba | 3.0.16 | |
| samba | samba | 3.0.17 | |
| samba | samba | 3.0.18 | |
| samba | samba | 3.0.19 | |
| samba | samba | 3.0.20 | |
| samba | samba | 3.0.20 | |
| samba | samba | 3.0.20 | |
| samba | samba | 3.0.20a | |
| samba | samba | 3.0.20b | |
| samba | samba | 3.0.21 | |
| samba | samba | 3.0.21 | |
| samba | samba | 3.0.21 | |
| samba | samba | 3.0.21 | |
| samba | samba | 3.0.21a | |
| samba | samba | 3.0.21b | |
| samba | samba | 3.0.21c | |
| samba | samba | 3.0.22 | |
| samba | samba | 3.0.23 | |
| samba | samba | 3.0.23 | |
| samba | samba | 3.0.23 | |
| samba | samba | 3.0.23 | |
| samba | samba | 3.0.23 | |
| samba | samba | 3.0.23a | |
| samba | samba | 3.0.23b | |
| samba | samba | 3.0.23c | |
| samba | samba | 3.0.23d | |
| samba | samba | 3.0.24 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25 | |
| samba | samba | 3.0.25a | |
| samba | samba | 3.0.25b | |
| samba | samba | 3.0.25c | |
| samba | samba | 3.0.26 | |
| samba | samba | 3.0.26 | |
| samba | samba | 3.0.26a | |
| samba | samba | 3.0.27 | |
| samba | samba | 3.0.27 | |
| samba | samba | 3.0.28 | |
| samba | samba | 3.0.28 | |
| samba | samba | 3.0.29 | |
| samba | samba | 3.0.30 | |
| samba | samba | 3.0.31 | |
| samba | samba | 3.0.32 | |
| samba | samba | 3.0.33 | |
| samba | samba | 3.0.34 | |
| samba | samba | 3.0.35 | |
| samba | samba | 3.0.36 | |
| samba | samba | 3.0.37 | |
| samba | samba | 3.1.0 | |
| samba | samba | 3.2.0 | |
| samba | samba | 3.2.1 | |
| samba | samba | 3.2.2 | |
| samba | samba | 3.2.3 | |
| samba | samba | 3.2.4 | |
| samba | samba | 3.2.5 | |
| samba | samba | 3.2.6 | |
| samba | samba | 3.2.7 | |
| samba | samba | 3.2.8 | |
| samba | samba | 3.2.9 | |
| samba | samba | 3.2.10 | |
| samba | samba | 3.2.11 | |
| samba | samba | 3.2.12 | |
| samba | samba | 3.2.13 | |
| samba | samba | 3.2.14 | |
| samba | samba | 3.2.15 | |
| samba | samba | 3.3.0 | |
| samba | samba | 3.3.1 | |
| samba | samba | 3.3.2 | |
| samba | samba | 3.3.3 | |
| samba | samba | 3.3.4 | |
| samba | samba | 3.3.5 | |
| samba | samba | 3.3.6 | |
| samba | samba | 3.3.7 | |
| samba | samba | 3.3.8 | |
| samba | samba | 3.3.9 | |
| samba | samba | 3.3.10 | |
| samba | samba | 3.3.11 | |
| samba | samba | 3.3.12 | |
| samba | samba | 3.3.13 | |
| samba | samba | 3.3.14 | |
| samba | samba | 3.3.15 | |
| samba | samba | 3.3.16 | |
| samba | samba | 3.4.0 | |
| samba | samba | 3.4.1 | |
| samba | samba | 3.4.2 | |
| samba | samba | 3.4.3 | |
| samba | samba | 3.4.4 | |
| samba | samba | 3.4.5 | |
| samba | samba | 3.4.6 | |
| samba | samba | 3.4.7 | |
| samba | samba | 3.4.8 | |
| samba | samba | 3.4.9 | |
| samba | samba | 3.4.10 | |
| samba | samba | 3.4.11 | |
| samba | samba | 3.4.12 | |
| samba | samba | 3.4.13 | |
| samba | samba | 3.4.14 | |
| samba | samba | 3.4.15 | |
| samba | samba | 3.4.16 | |
| samba | samba | 3.4.17 | |
| samba | samba | 3.5.0 | |
| samba | samba | 3.5.1 | |
| samba | samba | 3.5.2 | |
| samba | samba | 3.5.3 | |
| samba | samba | 3.5.4 | |
| samba | samba | 3.5.5 | |
| samba | samba | 3.5.6 | |
| samba | samba | 3.5.7 | |
| samba | samba | 3.5.8 | |
| samba | samba | 3.5.9 | |
| samba | samba | 3.5.10 | |
| samba | samba | 3.5.11 | |
| samba | samba | 3.5.12 | |
| samba | samba | 3.5.13 | |
| samba | samba | 3.5.14 | |
| samba | samba | 3.5.15 | |
| samba | samba | 3.5.16 | |
| samba | samba | 3.5.17 | |
| samba | samba | 3.5.18 | |
| samba | samba | 3.5.19 | |
| samba | samba | 3.5.20 | |
| samba | samba | 3.5.21 | |
| samba | samba | 3.6.0 | |
| samba | samba | 3.6.1 | |
| samba | samba | 3.6.2 | |
| samba | samba | 3.6.3 | |
| samba | samba | 3.6.4 | |
| samba | samba | 3.6.5 | |
| samba | samba | 3.6.6 | |
| samba | samba | 3.6.7 | |
| samba | samba | 3.6.8 | |
| samba | samba | 3.6.9 | |
| samba | samba | 3.6.10 | |
| samba | samba | 3.6.11 | |
| samba | samba | 3.6.12 | |
| samba | samba | 3.6.13 | |
| samba | samba | 3.6.14 | |
| samba | samba | 3.6.15 | |
| samba | samba | 3.6.16 | |
| samba | samba | 3.6.17 | |
| samba | samba | 3.6.18 | |
| samba | samba | 3.6.19 | |
| samba | samba | 3.6.20 | |
| samba | samba | 3.6.21 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
"matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
"matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
"matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
"matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
"matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
"matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
"matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
"matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
"matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
"matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
"matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
"matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
"matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
"matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
"matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
"matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
"matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n dcerpc_read_ncacn_packet_done en librpc/rpc/dcerpc_util.c en winbindd en Samba 3.x anterior a 3.6.22, 4.0.x anterior a 4.0.13 y 4.1.x anterior a 4.1.3 que permite a los controladores de dominio de AD remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una longitud erroenea de los fragmentos de un paquete de DCE-RPC."
}
],
"id": "CVE-2013-4408",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-12-10T06:14:55.087",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
},
{
"source": "secalert@redhat.com",
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/64191"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-2054-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/64191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2054-1"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-VWX5-5C9R-MMRH
Vulnerability from github – Published: 2022-05-17 03:07 – Updated: 2022-05-17 03:07Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
{
"affected": [],
"aliases": [
"CVE-2013-4408"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-12-10T06:14:00Z",
"severity": "HIGH"
},
"details": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.",
"id": "GHSA-vwx5-5c9r-mmrh",
"modified": "2022-05-17T03:07:11Z",
"published": "2022-05-17T03:07:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4408"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2013:1805"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2013:1806"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2014:0009"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2013-4408"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018032"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1805.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2812"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:299"
},
{
"type": "WEB",
"url": "http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch"
},
{
"type": "WEB",
"url": "http://www.samba.org/samba/security/CVE-2013-4408"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/64191"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2054-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.