diff options
author | timur <timur@FreeBSD.org> | 2015-12-20 07:42:25 +0800 |
---|---|---|
committer | timur <timur@FreeBSD.org> | 2015-12-20 07:42:25 +0800 |
commit | b12a47936689ec3bd5fca5696a30b23433243dc8 (patch) | |
tree | 36a7a4317f1370de047046928fab6469013286ee /security/vuxml | |
parent | db5e293308d6d9a997375a48088615d53c293625 (diff) | |
download | freebsd-ports-gnome-b12a47936689ec3bd5fca5696a30b23433243dc8.tar.gz freebsd-ports-gnome-b12a47936689ec3bd5fca5696a30b23433243dc8.tar.zst freebsd-ports-gnome-b12a47936689ec3bd5fca5696a30b23433243dc8.zip |
Add entry for multiple Samba vulnerabilities
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 68 |
1 files changed, 68 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index de4a4dad8415..0cc5cb1a2fc1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,74 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ef434839-a6a4-11e5-8275-000c292e4fd8"> + <topic>samba -- multiple vulnerabilities</topic> + <affects> + <package> + <name>samba36</name> + <range><ge>3.6.0</ge><le>3.6.25</le></range> + </package> + <package> + <name>samba4</name> + <range><ge>4.0.0</ge><le>4.0.26</le></range> + </package> + <package> + <name>samba41</name> + <range><ge>4.1.0</ge><lt>4.1.22</lt></range> + </package> + <package> + <name>samba42</name> + <range><ge>4.2.0</ge><lt>4.2.7</lt></range> + </package> + <package> + <name>samba43</name> + <range><ge>4.3.0</ge><lt>4.3.3</lt></range> + </package> + <package> + <name>ldb</name> + <range><ge>1.0.0</ge><lt>1.1.24</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Samba team reports:</p> + <blockquote cite="https://www.samba.org/samba/latest_news.html#4.3.3"> + <p>[CVE-2015-3223] Malicious request can cause Samba LDAP server to hang, spinning using CPU.</p> + <p>[CVE-2015-5330] Malicious request can cause Samba LDAP server + to return uninitialized memory that should not be part of the reply.</p> + <p>[CVE-2015-5296] Requesting encryption should also request + signing when setting up the connection to protect against man-in-the-middle attacks.</p> + <p>[CVE-2015-5299] A missing access control check in the VFS + shadow_copy2 module could allow unauthorized users to access snapshots.</p> + <p>[CVE-2015-7540] Malicious request can cause Samba LDAP server to return crash.</p> + <p>[CVE-2015-8467] Samba can expose Windows DCs to MS15-096 + Denial of service via the creation of multiple machine accounts(The Microsoft issue is CVE-2015-2535).</p> + <p>[CVE-2015-5252] Insufficient symlink verification could allow data access outside share path.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-3223</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-3223.html</url> + <cvename>CVE-2015-5252</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-5252.html</url> + <cvename>CVE-2015-5296</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-5296.html</url> + <cvename>CVE-2015-5299</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-5299.html</url> + <cvename>CVE-2015-5330</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-5330.html</url> + <cvename>CVE-2015-7540</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-7540.html</url> + <cvename>CVE-2015-8467</cvename> + <url>https://www.samba.org/samba/security/CVE-2015-8467.html</url> + </references> + <dates> + <discovery>2015-12-16</discovery> + <entry>2015-12-19</entry> + </dates> + </vuln> + <vuln vid="bb7d4791-a5bf-11e5-a0e5-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |