Vulnerability & Exploit Database

Displaying entries 1 - 10 of 37 in total

Results for: CVE-2015-2305 Back to search

SUSE: CVE-2015-5310: SUSE Linux Security Advisory Vulnerability

  • Severity: 3
  • Published: January 06, 2016

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

Ubuntu: (Multiple Advisories) (CVE-2015-8467): Samba regression Vulnerability

  • Severity: 6
  • Published: December 29, 2015

The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveragin...

Ubuntu: (Multiple Advisories) (CVE-2015-5330): Samba regression Vulnerability

  • Severity: 5
  • Published: December 29, 2015

ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.

Ubuntu: (Multiple Advisories) (CVE-2015-5299): Samba regression Vulnerability

  • Severity: 5
  • Published: December 29, 2015

The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.

Ubuntu: (Multiple Advisories) (CVE-2015-5296): Samba regression Vulnerability

  • Severity: 4
  • Published: December 29, 2015

Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.

Ubuntu: (Multiple Advisories) (CVE-2015-5252): Samba regression Vulnerability

  • Severity: 5
  • Published: December 29, 2015

vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.

Ubuntu: (Multiple Advisories) (CVE-2015-3223): Samba regression Vulnerability

  • Severity: 5
  • Published: December 29, 2015

The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.

CentOS: (CVE-2015-5330) (Multiple Advisories): samba4 Vulnerability

  • Severity: 5
  • Published: December 29, 2015

ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.

CentOS: (CVE-2015-5299) (Multiple Advisories): samba Vulnerability

  • Severity: 5
  • Published: December 29, 2015

The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.

CentOS: (CVE-2015-5296) (Multiple Advisories): samba Vulnerability

  • Severity: 4
  • Published: December 29, 2015

Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.