Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
01 Sep 2022, 16:34
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-665 | |
References | (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/59579 - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2014:136 - Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/532757/100/0/threaded - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/67686 - Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2015:082 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201502-15.xml - Third Party Advisory | |
References | (CONFIRM) http://advisories.mageia.org/MGASA-2014-0279.html - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1030308 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/59407 - Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html - Mailing List, Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/59378 - Third Party Advisory | |
CPE | cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:* |
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* |
Information
Published : 2014-05-28 04:58
Updated : 2024-02-04 18:35
NVD link : CVE-2014-0178
Mitre link : CVE-2014-0178
CVE.ORG link : CVE-2014-0178
JSON object : View
Products Affected
samba
- samba
CWE
CWE-665
Improper Initialization