{"id":"UBUNTU-CVE-2014-3493","details":"The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.","modified":"2026-02-04T04:40:17.836571Z","published":"2014-06-23T00:00:00Z","related":["USN-2257-1"],"upstream":["CVE-2014-3493"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3493"},{"type":"REPORT","url":"http://www.samba.org/samba/security/CVE-2014-3493"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2257-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-3493"}],"affected":[{"package":{"name":"samba","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/samba@2:4.1.6+dfsg-1ubuntu2.14.04.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.1.6+dfsg-1ubuntu2.14.04.2"}]}],"versions":["2:3.6.18-1ubuntu3","2:4.0.10+dfsg-4ubuntu2","2:4.0.13+dfsg-1ubuntu1","2:4.1.3+dfsg-2ubuntu2","2:4.1.3+dfsg-2ubuntu3","2:4.1.3+dfsg-2ubuntu4","2:4.1.3+dfsg-2ubuntu5","2:4.1.6+dfsg-1ubuntu1","2:4.1.6+dfsg-1ubuntu2","2:4.1.6+dfsg-1ubuntu2.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libnss-winbind","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libpam-smbpass","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libpam-winbind","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libparse-pidl-perl","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libsmbclient","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libsmbclient-dev","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libsmbsharemodes-dev","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libsmbsharemodes0","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libwbclient-dev","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"libwbclient0","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"python-samba","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"registry-tools","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-common","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-common-bin","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-dev","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-dsdb-modules","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-libs","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-testsuite","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"samba-vfs-modules","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"smbclient","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"},{"binary_name":"winbind","binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-3493.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}