vulnerability
FreeBSD: VID-646923b0-41c7-11ec-a3b2-005056a311d1 (CVE-2021-3738): samba -- Multiple Vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Nov 10, 2021 | Nov 4, 2022 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Nov 10, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025
Description
The Samba Team reports: CVE-2020-25717: A user in an AD Domain could become root on domain members. CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC. CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets. CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). CVE-2020-25722: Samba AD DC did not do sufficient access and conformance checking of data stored. CVE-2016-2124: SMB1 client connections can be downgraded to plaintext authentication. CVE-2021-3738: Use after free in Samba AD DC RPC server. CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
Solutions
freebsd-upgrade-package-samba413freebsd-upgrade-package-samba414freebsd-upgrade-package-samba415
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.