Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
samba samba 3.0.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-40029
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.
Huawei Harmonyos
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
5
CVSSv2
CVE-2021-40035
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.
Huawei Harmonyos
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
5
CVSSv2
CVE-2011-0719
Samba 3.x prior to 3.3.15, 3.4.x prior to 3.4.12, and 3.5.x prior to 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote malicious users to cause a denial of service (stack memory corruption, and infinite loop or daemon cra...
Samba Samba 3.0.28
Samba Samba 3.2.13
Samba Samba 3.0.35
Samba Samba 3.0.18
Samba Samba 3.0.17
Samba Samba 3.0.10
Samba Samba 3.0.13
Samba Samba 3.0.24
Samba Samba 3.0.25
Samba Samba 3.0.21c
Samba Samba 3.0.22
Samba Samba 3.2.5
Samba Samba 3.0.27
Samba Samba 3.0.37
Samba Samba 3.0.29
Samba Samba 3.0.15
Samba Samba 3.0.11
Samba Samba 3.0.23c
Samba Samba 3.0.23d
Samba Samba 3.0.21a
Samba Samba 3.0.21b
Samba Samba 3.0.2a
5
CVSSv2
CVE-2010-1635
The chain_reply function in process.c in smbd in Samba prior to 3.4.8 and 3.5.x prior to 3.5.2 allows remote malicious users to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a ...
Samba Samba 3.0.19
Samba Samba 3.0.14a
Samba Samba 3.0.27
Samba Samba 3.0.31
Samba Samba 3.0.3
Samba Samba 3.0.8
Samba Samba 3.2.15
Samba Samba 3.3.3
Samba Samba 3.5.1
Samba Samba 3.0.29
Samba Samba 3.0.25
Samba Samba 3.0.25b
Samba Samba 3.2.5
Samba Samba 3.4.2
Samba Samba 3.2.3
Samba Samba 3.3
Samba Samba 3.0.2a
Samba Samba 3.0.36
Samba Samba 3.4.0
Samba Samba 3.2.4
Samba Samba 3.0.5
Samba Samba 3.3.9
5
CVSSv2
CVE-2010-1642
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba prior to 3.4.8 and 3.5.x prior to 3.5.2 allows remote malicious users to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup ...
Samba Samba 3.0.19
Samba Samba 3.0.14a
Samba Samba 3.0.27
Samba Samba 3.0.31
Samba Samba 3.0.3
Samba Samba 3.0.8
Samba Samba 3.2.15
Samba Samba 3.3.3
Samba Samba 3.5.1
Samba Samba 3.0.29
Samba Samba 3.0.25
Samba Samba 3.0.25b
Samba Samba 3.2.5
Samba Samba 3.4.2
Samba Samba 3.2.3
Samba Samba 3.3
Samba Samba 3.0.2a
Samba Samba 3.0.36
Samba Samba 3.4.0
Samba Samba 3.2.4
Samba Samba 3.0.5
Samba Samba 3.3.9
5
CVSSv2
CVE-2004-0930
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
Samba Samba 3.0.7
Sgi Samba 3.0.1
Sgi Samba 3.0
Conectiva Linux 10.0
Samba Samba 3.0.5
Samba Samba 3.0.6
Sgi Samba 3.0.6
Sgi Samba 3.0.7
Samba Samba 3.0.0
Sgi Samba 3.0.2
Sgi Samba 3.0.3
Samba Samba 3.0.3
Samba Samba 3.0.4
Sgi Samba 3.0.4
Sgi Samba 3.0.5
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Fedora Core Core 3.0
Gentoo Linux
Redhat Enterprise Linux Desktop 3.0
Redhat Fedora Core Core 2.0
5
CVSSv2
CVE-2004-0808
The process_logon_packet function in the nmbd server for Samba 3.0.6 and previous versions, when domain logons are enabled, allows remote malicious users to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures tha...
Samba Samba 3.0.4
Samba Samba 3.0.2a
Samba Samba 3.0.3
Samba Samba 3.0.0
Samba Samba 3.0.5
Samba Samba 3.0.6
Samba Samba 3.0.1
Samba Samba 3.0.2
5
CVSSv2
CVE-2004-0807
Samba 3.0.6 and previous versions allows remote malicious users to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
Samba Samba 3.0.1
Samba Samba 3.0.2
Sgi Samba 3.0.2
Sgi Samba 3.0.3
Samba Samba 3.0.0
Samba Samba 3.0.6
Sgi Samba 3.0.1
Conectiva Linux 10.0
Conectiva Linux 9.0
Samba Samba 3.0.2a
Samba Samba 3.0.3
Samba Samba 3.0.4
Sgi Samba 3.0.4
Sgi Samba 3.0.5
Samba Samba 3.0.5
Sgi Samba 3.0.6
Sgi Samba 3.0
Mandrakesoft Mandrake Linux 10.0
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 8.1
Suse Suse Linux 8.2
5
CVSSv2
CVE-2004-0686
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
Samba Samba
Trustix Secure Linux 2.0
Trustix Secure Linux 1.5
Trustix Secure Linux 2.1
4.3
CVSSv2
CVE-2016-2124
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Samba Samba
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Resilient Storage 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Gluster Storage 3.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Openstack 13
Redhat Openstack 16.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »