Your submission was sent successfully! Close

CVE-2014-0178

Published: 28 May 2014

Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.

Priority

Medium

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
Upstream
Released (3.6.23,4.0.18,4.1.8)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(2:4.1.8+dfsg-1ubuntu1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2:4.1.6+dfsg-1ubuntu2.14.04.2)
Patches:
Upstream: http://git.samba.org/?p=samba.git;a=commit;h=ab51cd90a077c2938620afedc61e2da21cb509be (4.x)
Upstream: http://git.samba.org/?p=samba.git;a=commit;h=dbe2ef7f66c4c5cde1e1300675fcb78f4de3af70 (4.x)
samba4
Launchpad, Ubuntu, Debian
Upstream
Released (3.6.23,4.0.18,4.1.8)
Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist