CVE-2014-0178
Published: 28 May 2014
Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(code not present)
|
precise |
Not vulnerable
(code not present)
|
|
saucy |
Released
(2:3.6.18-1ubuntu3.3)
|
|
trusty |
Released
(2:4.1.6+dfsg-1ubuntu2.14.04.2)
|
|
upstream |
Released
(3.6.23,4.0.18,4.1.8)
|
|
utopic |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
vivid |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
wily |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
xenial |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
yakkety |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
zesty |
Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
|
|
Patches: upstream: http://git.samba.org/?p=samba.git;a=commit;h=ab51cd90a077c2938620afedc61e2da21cb509be (4.x) upstream: http://git.samba.org/?p=samba.git;a=commit;h=dbe2ef7f66c4c5cde1e1300675fcb78f4de3af70 (4.x) |
||
samba4 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.6.23,4.0.18,4.1.8)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|