CVE-2013-4496
Published: 14 March 2014
Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
lucid |
Released
(2:3.4.7~dfsg-1ubuntu3.14)
|
precise |
Released
(2:3.6.3-2ubuntu2.10)
|
|
quantal |
Released
(2:3.6.6-3ubuntu5.4)
|
|
saucy |
Released
(2:3.6.18-1ubuntu3.2)
|
|
trusty |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
upstream |
Released
(3.6.23, 4.0.16, 4.1.6)
|
|
utopic |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
vivid |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
wily |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
xenial |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
yakkety |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
zesty |
Released
(2:4.1.3+dfsg-2ubuntu4)
|
|
Patches: upstream: http://www.samba.org/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch upstream: http://www.samba.org/samba/ftp/patches/security/samba-3.6.22-CVE-2013-4496.patch upstream: http://git.samba.org/?p=samba.git;a=commit;h=87ad66195e9035f1e5fbca7c4ccc4458f10aa875 upstream: http://git.samba.org/?p=samba.git;a=commit;h=88c9f6820bafc74a93487e5d7d4b24768bd157a6 upstream: http://git.samba.org/?p=samba.git;a=commit;h=906bf7fd50da8acd7720589fe0fe8b7ebde81a5a |
||
samba4 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.0.16, 4.1.6)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: http://www.samba.org/samba/ftp/patches/security/samba-4.1.5-CVE-2013-4496-CVE-2013-6442.patch upstream: http://www.samba.org/samba/ftp/patches/security/samba-4.0.15-CVE-2013-4496-CVE-2013-6442.patch |