{"id":"USN-2922-1","summary":"samba vulnerabilities","details":"Jeremy Allison discovered that Samba incorrectly handled ACLs on symlink\npaths. A remote attacker could use this issue to overwrite the ownership of\nACLs using symlinks. (CVE-2015-7560)\n\nGarming Sam and Douglas Bagnall discovered that the Samba internal DNS\nserver incorrectly handled certain DNS TXT records. A remote attacker could\nuse this issue to cause Samba to crash, resulting in a denial of service,\nor possibly obtain uninitialized memory contents. This issue only applied\nto Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2016-0771)\n\nIt was discovered that the Samba Web Administration Tool (SWAT) was\nvulnerable to clickjacking and cross-site request forgery attacks. This\nissue only affected Ubuntu 12.04 LTS. (CVE-2013-0213, CVE-2013-0214)\n","modified":"2026-04-22T09:22:52.106876Z","published":"2016-03-08T13:51:17Z","related":["UBUNTU-CVE-2015-7560","UBUNTU-CVE-2016-0771"],"upstream":["CVE-2015-7560","CVE-2016-0771","UBUNTU-CVE-2013-0213","UBUNTU-CVE-2013-0214","UBUNTU-CVE-2015-7560","UBUNTU-CVE-2016-0771"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2922-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-0213"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-0214"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7560"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-0771"}],"affected":[{"package":{"name":"samba","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/samba@2:4.1.6+dfsg-1ubuntu2.14.04.13?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.1.6+dfsg-1ubuntu2.14.04.13"}]}],"versions":["2:3.6.18-1ubuntu3","2:4.0.10+dfsg-4ubuntu2","2:4.0.13+dfsg-1ubuntu1","2:4.1.3+dfsg-2ubuntu2","2:4.1.3+dfsg-2ubuntu3","2:4.1.3+dfsg-2ubuntu4","2:4.1.3+dfsg-2ubuntu5","2:4.1.6+dfsg-1ubuntu1","2:4.1.6+dfsg-1ubuntu2","2:4.1.6+dfsg-1ubuntu2.14.04.1","2:4.1.6+dfsg-1ubuntu2.14.04.2","2:4.1.6+dfsg-1ubuntu2.14.04.3","2:4.1.6+dfsg-1ubuntu2.14.04.4","2:4.1.6+dfsg-1ubuntu2.14.04.5","2:4.1.6+dfsg-1ubuntu2.14.04.7","2:4.1.6+dfsg-1ubuntu2.14.04.8","2:4.1.6+dfsg-1ubuntu2.14.04.9","2:4.1.6+dfsg-1ubuntu2.14.04.11","2:4.1.6+dfsg-1ubuntu2.14.04.12"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libnss-winbind"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libpam-smbpass"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libpam-winbind"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libparse-pidl-perl"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libsmbclient"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libsmbsharemodes0"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"libwbclient0"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"python-samba"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"registry-tools"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-common"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-common-bin"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-dsdb-modules"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-libs"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-testsuite"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"samba-vfs-modules"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"smbclient"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.13","binary_name":"winbind"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2922-1.json","cves_map":{"cves":[{"id":"CVE-2015-7560","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-0771","severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.5"}